Home

Description

In the Linux kernel, the following vulnerability has been resolved: rcu: Protect ->defer_qs_iw_pending from data race On kernels built with CONFIG_IRQ_WORK=y, when rcu_read_unlock() is invoked within an interrupts-disabled region of code [1], it will invoke rcu_read_unlock_special(), which uses an irq-work handler to force the system to notice when the RCU read-side critical section actually ends. That end won't happen until interrupts are enabled at the soonest. In some kernels, such as those booted with rcutree.use_softirq=y, the irq-work handler is used unconditionally. The per-CPU rcu_data structure's ->defer_qs_iw_pending field is updated by the irq-work handler and is both read and updated by rcu_read_unlock_special(). This resulted in the following KCSAN splat: ------------------------------------------------------------------------ BUG: KCSAN: data-race in rcu_preempt_deferred_qs_handler / rcu_read_unlock_special read to 0xffff96b95f42d8d8 of 1 bytes by task 90 on cpu 8: rcu_read_unlock_special+0x175/0x260 __rcu_read_unlock+0x92/0xa0 rt_spin_unlock+0x9b/0xc0 __local_bh_enable+0x10d/0x170 __local_bh_enable_ip+0xfb/0x150 rcu_do_batch+0x595/0xc40 rcu_cpu_kthread+0x4e9/0x830 smpboot_thread_fn+0x24d/0x3b0 kthread+0x3bd/0x410 ret_from_fork+0x35/0x40 ret_from_fork_asm+0x1a/0x30 write to 0xffff96b95f42d8d8 of 1 bytes by task 88 on cpu 8: rcu_preempt_deferred_qs_handler+0x1e/0x30 irq_work_single+0xaf/0x160 run_irq_workd+0x91/0xc0 smpboot_thread_fn+0x24d/0x3b0 kthread+0x3bd/0x410 ret_from_fork+0x35/0x40 ret_from_fork_asm+0x1a/0x30 no locks held by irq_work/8/88. irq event stamp: 200272 hardirqs last enabled at (200272): [<ffffffffb0f56121>] finish_task_switch+0x131/0x320 hardirqs last disabled at (200271): [<ffffffffb25c7859>] __schedule+0x129/0xd70 softirqs last enabled at (0): [<ffffffffb0ee093f>] copy_process+0x4df/0x1cc0 softirqs last disabled at (0): [<0000000000000000>] 0x0 ------------------------------------------------------------------------ The problem is that irq-work handlers run with interrupts enabled, which means that rcu_preempt_deferred_qs_handler() could be interrupted, and that interrupt handler might contain an RCU read-side critical section, which might invoke rcu_read_unlock_special(). In the strict KCSAN mode of operation used by RCU, this constitutes a data race on the ->defer_qs_iw_pending field. This commit therefore disables interrupts across the portion of the rcu_preempt_deferred_qs_handler() that updates the ->defer_qs_iw_pending field. This suffices because this handler is not a fast path.

PUBLISHED Reserved 2025-04-16 | Published 2025-09-11 | Updated 2025-09-29 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 74f58f382a7c8333f8d09701aefaa25913bdbe0e
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before f937759c7432d6151b73e1393b6517661813d506
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 0ad84d62217488e679ecc90e8628980dcc003de3
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before b5de8d80b5d049f051b95d9b1ee50ae4ab656124
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before b55947b725f190396f475d5d0c59aa855a4d8895
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before e35e711c78c8a4c43330c0dcb1c4d507a19c20f4
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 90de9c94ea72327cfa9c2c9f6113c23a513af60b
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 55e11f6776798b27cf09a7aa0d718415d4fc9cf5
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 90c09d57caeca94e6f3f87c49e96a91edd40cbfd
affected

Default status
affected

5.4.297 (semver)
unaffected

5.10.241 (semver)
unaffected

5.15.190 (semver)
unaffected

6.1.149 (semver)
unaffected

6.6.103 (semver)
unaffected

6.12.43 (semver)
unaffected

6.15.11 (semver)
unaffected

6.16.2 (semver)
unaffected

6.17 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/74f58f382a7c8333f8d09701aefaa25913bdbe0e

git.kernel.org/...c/f937759c7432d6151b73e1393b6517661813d506

git.kernel.org/...c/0ad84d62217488e679ecc90e8628980dcc003de3

git.kernel.org/...c/b5de8d80b5d049f051b95d9b1ee50ae4ab656124

git.kernel.org/...c/b55947b725f190396f475d5d0c59aa855a4d8895

git.kernel.org/...c/e35e711c78c8a4c43330c0dcb1c4d507a19c20f4

git.kernel.org/...c/90de9c94ea72327cfa9c2c9f6113c23a513af60b

git.kernel.org/...c/55e11f6776798b27cf09a7aa0d718415d4fc9cf5

git.kernel.org/...c/90c09d57caeca94e6f3f87c49e96a91edd40cbfd

cve.org (CVE-2025-39749)

nvd.nist.gov (CVE-2025-39749)

Download JSON