We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-53030

octeontx2-pf: Avoid use of GFP_KERNEL in atomic context



Description

In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: Avoid use of GFP_KERNEL in atomic context Using GFP_KERNEL in preemption disable context, causing below warning when CONFIG_DEBUG_ATOMIC_SLEEP is enabled. [ 32.542271] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274 [ 32.550883] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1, name: swapper/0 [ 32.558707] preempt_count: 1, expected: 0 [ 32.562710] RCU nest depth: 0, expected: 0 [ 32.566800] CPU: 3 PID: 1 Comm: swapper/0 Tainted: G W 6.2.0-rc2-00269-gae9dcb91c606 #7 [ 32.576188] Hardware name: Marvell CN106XX board (DT) [ 32.581232] Call trace: [ 32.583670] dump_backtrace.part.0+0xe0/0xf0 [ 32.587937] show_stack+0x18/0x30 [ 32.591245] dump_stack_lvl+0x68/0x84 [ 32.594900] dump_stack+0x18/0x34 [ 32.598206] __might_resched+0x12c/0x160 [ 32.602122] __might_sleep+0x48/0xa0 [ 32.605689] __kmem_cache_alloc_node+0x2b8/0x2e0 [ 32.610301] __kmalloc+0x58/0x190 [ 32.613610] otx2_sq_aura_pool_init+0x1a8/0x314 [ 32.618134] otx2_open+0x1d4/0x9d0 To avoid use of GFP_ATOMIC for memory allocation, disable preemption after all memory allocation is done.

Reserved 2025-03-27 | Published 2025-03-27 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

6ea5273c71dd2d07c0a2459594eb34bc087939f7 before 2827c4eb429db64befdca11362e2b1c5f524f6ba
affected

667ce030bdfb62a86266444b2c3fd6ab98b9df9b before 1eb57b87f106c90cee6b2a56a10f2e29c7a25f3e
affected

4af1b64f80fbe1275fb02c5f1c0cef099a4a231f before 87b93b678e95c7d93fe6a55b0e0fbda26d8c7760
affected

b754dc7c933dd9464223f64b10d33d68ab086cc6
affected

Default status
unaffected

5.15.87 before 5.15.91
affected

6.1.5 before 6.1.8
affected

References

git.kernel.org/...c/2827c4eb429db64befdca11362e2b1c5f524f6ba

git.kernel.org/...c/1eb57b87f106c90cee6b2a56a10f2e29c7a25f3e

git.kernel.org/...c/87b93b678e95c7d93fe6a55b0e0fbda26d8c7760

cve.org (CVE-2023-53030)

nvd.nist.gov (CVE-2023-53030)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2023-53030

Support options

Helpdesk Chat, Email, Knowledgebase