Home

Description

In the Linux kernel, the following vulnerability has been resolved: LoongArch: BPF: Fix jump offset calculation in tailcall The extra pass of bpf_int_jit_compile() skips JIT context initialization which essentially skips offset calculation leaving out_offset = -1, so the jmp_offset in emit_bpf_tail_call is calculated by "#define jmp_offset (out_offset - (cur_offset))" is a negative number, which is wrong. The final generated assembly are as follow. 54: bgeu $a2, $t1, -8 # 0x0000004c 58: addi.d $a6, $s5, -1 5c: bltz $a6, -16 # 0x0000004c 60: alsl.d $t2, $a2, $a1, 0x3 64: ld.d $t2, $t2, 264 68: beq $t2, $zero, -28 # 0x0000004c Before apply this patch, the follow test case will reveal soft lock issues. cd tools/testing/selftests/bpf/ ./test_progs --allow=tailcalls/tailcall_bpf2bpf_1 dmesg: watchdog: BUG: soft lockup - CPU#2 stuck for 26s! [test_progs:25056]

PUBLISHED Reserved 2025-04-16 | Published 2025-09-04 | Updated 2025-09-29 | Assigner Linux

Product status

Default status
unaffected

5dc615520c4dfb358245680f1904bad61116648e (git) before 1a782fa32e644aa9fbae6c8488f3e61221ac96e1
affected

5dc615520c4dfb358245680f1904bad61116648e (git) before 17c010fe45def335fe03a0718935416b04c7f349
affected

5dc615520c4dfb358245680f1904bad61116648e (git) before f83d469e16bb1f75991ca67c56786fb2aaa42bea
affected

5dc615520c4dfb358245680f1904bad61116648e (git) before f2b5e50cc04d7a049b385bc1c93b9cbf5f10c94f
affected

5dc615520c4dfb358245680f1904bad61116648e (git) before 9262e3e04621558e875eb5afb5e726b648cd5949
affected

5dc615520c4dfb358245680f1904bad61116648e (git) before cd39d9e6b7e4c58fa77783e7aedf7ada51d02ea3
affected

Default status
affected

6.1
affected

Any version before 6.1
unaffected

6.1.149 (semver)
unaffected

6.6.103 (semver)
unaffected

6.12.43 (semver)
unaffected

6.15.11 (semver)
unaffected

6.16.2 (semver)
unaffected

6.17 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/1a782fa32e644aa9fbae6c8488f3e61221ac96e1

git.kernel.org/...c/17c010fe45def335fe03a0718935416b04c7f349

git.kernel.org/...c/f83d469e16bb1f75991ca67c56786fb2aaa42bea

git.kernel.org/...c/f2b5e50cc04d7a049b385bc1c93b9cbf5f10c94f

git.kernel.org/...c/9262e3e04621558e875eb5afb5e726b648cd5949

git.kernel.org/...c/cd39d9e6b7e4c58fa77783e7aedf7ada51d02ea3

cve.org (CVE-2025-38723)

nvd.nist.gov (CVE-2025-38723)

Download JSON