CVE-2025-38723
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
04/09/2025
Last modified:
05/09/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
LoongArch: BPF: Fix jump offset calculation in tailcall<br />
<br />
The extra pass of bpf_int_jit_compile() skips JIT context initialization<br />
which essentially skips offset calculation leaving out_offset = -1, so<br />
the jmp_offset in emit_bpf_tail_call is calculated by<br />
<br />
"#define jmp_offset (out_offset - (cur_offset))"<br />
<br />
is a negative number, which is wrong. The final generated assembly are<br />
as follow.<br />
<br />
54: bgeu $a2, $t1, -8 # 0x0000004c<br />
58: addi.d $a6, $s5, -1<br />
5c: bltz $a6, -16 # 0x0000004c<br />
60: alsl.d $t2, $a2, $a1, 0x3<br />
64: ld.d $t2, $t2, 264<br />
68: beq $t2, $zero, -28 # 0x0000004c<br />
<br />
Before apply this patch, the follow test case will reveal soft lock issues.<br />
<br />
cd tools/testing/selftests/bpf/<br />
./test_progs --allow=tailcalls/tailcall_bpf2bpf_1<br />
<br />
dmesg:<br />
watchdog: BUG: soft lockup - CPU#2 stuck for 26s! [test_progs:25056]
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/17c010fe45def335fe03a0718935416b04c7f349
- https://git.kernel.org/stable/c/1a782fa32e644aa9fbae6c8488f3e61221ac96e1
- https://git.kernel.org/stable/c/9262e3e04621558e875eb5afb5e726b648cd5949
- https://git.kernel.org/stable/c/cd39d9e6b7e4c58fa77783e7aedf7ada51d02ea3
- https://git.kernel.org/stable/c/f2b5e50cc04d7a049b385bc1c93b9cbf5f10c94f
- https://git.kernel.org/stable/c/f83d469e16bb1f75991ca67c56786fb2aaa42bea