reader_page); if (!ret) goto spin; for (unsigned i = 0; i < 1U << 26; i++) /* inserted delay loop */ __asm__ __volatile__ ("" : : : "memory"); rb_list_head(reader->list.next)->prev = &cpu_buffer->reader_page->list; .. ---truncated--- "> reader_page);,if,(!ret) goto,spin;,for,(unsigned,i,=,0;,i,<,1U,<<,26;,i++),/*,inserted,delay loop,*/,__asm__,__volatile__,("",:,:,:,"memory"); rb_list_head(reader->list.next)->prev,= &cpu_buffer->reader_page->list;,..,---truncated--- ">
![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2024-38601 |
Description: | In the Linux kernel, the following vulnerability has been resolved:
ring-buffer: Fix a race between readers and resize checks The reader
code in rb_get_reader_page() swaps a new reader page into the ring
buffer by doing cmpxchg on old->list.prev->next to point it to the new
page. Following that, if the operation is successful,
old->list.next->prev gets updated too. This means the underlying
doubly-linked list is temporarily inconsistent, page->prev->next or
page->next->prev might not be equal back to page for some page in the
ring buffer. The resize operation in ring_buffer_resize() can be
invoked in parallel. It calls rb_check_pages() which can detect the
described inconsistency and stop further tracing: [ 190.271762]
------------[ cut here ]------------ [ 190.271771] WARNING: CPU: 1
PID: 6186 at kernel/trace/ring_buffer.c:1467
rb_check_pages.isra.0+0x6a/0xa0 [ 190.271789] Modules linked in: [...]
[ 190.271991] Unloaded tainted modules: intel_uncore_frequency(E):1
skx_edac(E):1 [ 190.272002] CPU: 1 PID: 6186 Comm: cmd.sh Kdump:
loaded Tainted: G E 6.9.0-rc6-default #5
158d3e1e6d0b091c34c3b96bfd99a1c58306d79f [ 190.272011] Hardware name:
QEMU Standard PC (Q35 + ICH9, 2009), BIOS
rel-1.16.0-0-gd239552c-rebuilt.opensuse.org 04/01/2014 [ 190.272015]
RIP: 0010:rb_check_pages.isra.0+0x6a/0xa0 [ 190.272023] Code: [...] [
190.272028] RSP: 0018:ffff9c37463abb70 EFLAGS: 00010206 [ 190.272034]
RAX: ffff8eba04b6cb80 RBX: 0000000000000007 RCX: ffff8eba01f13d80 [
190.272038] RDX: ffff8eba01f130c0 RSI: ffff8eba04b6cd00 RDI:
ffff8eba0004c700 [ 190.272042] RBP: ffff8eba0004c700 R08:
0000000000010002 R09: 0000000000000000 [ 190.272045] R10:
00000000ffff7f52 R11: ffff8eba7f600000 R12: ffff8eba0004c720 [
190.272049] R13: ffff8eba00223a00 R14: 0000000000000008 R15:
ffff8eba067a8000 [ 190.272053] FS: 00007f1bd64752c0(0000)
GS:ffff8eba7f680000(0000) knlGS:0000000000000000 [ 190.272057] CS:
0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 190.272061] CR2:
00007f1bd6662590 CR3: 000000010291e001 CR4: 0000000000370ef0 [
190.272070] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
0000000000000000 [ 190.272073] DR3: 0000000000000000 DR6:
00000000fffe0ff0 DR7: 0000000000000400 [ 190.272077] Call Trace: [
190.272098] |
Test IDs: | None available |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2024-38601 https://git.kernel.org/stable/c/1e160196042cac946798ac192a0bc3398f1aa66b https://git.kernel.org/stable/c/1e160196042cac946798ac192a0bc3398f1aa66b https://git.kernel.org/stable/c/54c64967ba5f8658ae7da76005024ebd3d9d8f6e https://git.kernel.org/stable/c/54c64967ba5f8658ae7da76005024ebd3d9d8f6e https://git.kernel.org/stable/c/595363182f28786d641666a09e674b852c83b4bb https://git.kernel.org/stable/c/595363182f28786d641666a09e674b852c83b4bb https://git.kernel.org/stable/c/5ef9e330406d3fb4f4b2c8bca2c6b8a93bae32d1 https://git.kernel.org/stable/c/5ef9e330406d3fb4f4b2c8bca2c6b8a93bae32d1 https://git.kernel.org/stable/c/79b52013429a42b8efdb0cda8bb0041386abab87 https://git.kernel.org/stable/c/79b52013429a42b8efdb0cda8bb0041386abab87 https://git.kernel.org/stable/c/af3274905b3143ea23142bbf77bd9b610c54e533 https://git.kernel.org/stable/c/af3274905b3143ea23142bbf77bd9b610c54e533 https://git.kernel.org/stable/c/b50932ea673b5a089a4bb570a8a868d95c72854e https://git.kernel.org/stable/c/b50932ea673b5a089a4bb570a8a868d95c72854e https://git.kernel.org/stable/c/c2274b908db05529980ec056359fae916939fdaa https://git.kernel.org/stable/c/c2274b908db05529980ec056359fae916939fdaa https://git.kernel.org/stable/c/c68b7a442ee61d04ca58b2b5cb5ea7cb8230f84a https://git.kernel.org/stable/c/c68b7a442ee61d04ca58b2b5cb5ea7cb8230f84a |