CVE-2024-57838
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
11/01/2025
Last modified:
05/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
s390/entry: Mark IRQ entries to fix stack depot warnings<br />
<br />
The stack depot filters out everything outside of the top interrupt<br />
context as an uninteresting or irrelevant part of the stack traces. This<br />
helps with stack trace de-duplication, avoiding an explosion of saved<br />
stack traces that share the same IRQ context code path but originate<br />
from different randomly interrupted points, eventually exhausting the<br />
stack depot.<br />
<br />
Filtering uses in_irqentry_text() to identify functions within the<br />
.irqentry.text and .softirqentry.text sections, which then become the<br />
last stack trace entries being saved.<br />
<br />
While __do_softirq() is placed into the .softirqentry.text section by<br />
common code, populating .irqentry.text is architecture-specific.<br />
<br />
Currently, the .irqentry.text section on s390 is empty, which prevents<br />
stack depot filtering and de-duplication and could result in warnings<br />
like:<br />
<br />
Stack depot reached limit capacity<br />
WARNING: CPU: 0 PID: 286113 at lib/stackdepot.c:252 depot_alloc_stack+0x39a/0x3c8<br />
<br />
with PREEMPT and KASAN enabled.<br />
<br />
Fix this by moving the IO/EXT interrupt handlers from .kprobes.text into<br />
the .irqentry.text section and updating the kprobes blacklist to include<br />
the .irqentry.text section.<br />
<br />
This is done only for asynchronous interrupts and explicitly not for<br />
program checks, which are synchronous and where the context beyond the<br />
program check is important to preserve. Despite machine checks being<br />
somewhat in between, they are extremely rare, and preserving context<br />
when possible is also of value.<br />
<br />
SVCs and Restart Interrupts are not relevant, one being always at the<br />
boundary to user space and the other being a one-time thing.<br />
<br />
IRQ entries filtering is also optionally used in ftrace function graph,<br />
where the same logic applies.
Impact
Base Score 3.x
7.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15.174 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.120 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.64 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.4 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1af22528fee8072b7adc007b8ca49cc4ea62689e
- https://git.kernel.org/stable/c/45c9f2b856a075a34873d00788d2e8a250c1effd
- https://git.kernel.org/stable/c/473ffae3030188f1c6b80e1b3631a26b4adf7b32
- https://git.kernel.org/stable/c/5bb7a2c3afcf8732dc65ea49c09147b07da1d993
- https://lists.debian.org/debian-lts-announce/2025/03/msg00001.html



