Stack Depot Warnings Resolved in Linux Kernel for s390 Architecture
CVE-2024-57838
Summary
A vulnerability in the Linux kernel's handling of IRQ entries on the s390 architecture has led to stack depot warnings due to inadequate filtering. The empty .irqentry.text section obstructs effective stack trace de-duplication, potentially resulting in stack depot limit capacity warnings when PREEMPT and KASAN are enabled. To address this, the fix involves relocating IO/EXT interrupt handlers from .kprobes.text into the .irqentry.text section, thus enhancing the system's ability to manage interrupts effectively without unnecessary overhead.
Affected Version(s)
Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 5bb7a2c3afcf8732dc65ea49c09147b07da1d993
Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 1af22528fee8072b7adc007b8ca49cc4ea62689e
References
Timeline
Vulnerability published
Vulnerability Reserved