CVE-2023-53030

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-53030
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-53030.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-53030
Downstream
Related
Published
2025-03-27T16:43:58.921Z
Modified
2025-11-28T02:35:45.440664Z
Summary
octeontx2-pf: Avoid use of GFP_KERNEL in atomic context
Details

In the Linux kernel, the following vulnerability has been resolved:

octeontx2-pf: Avoid use of GFP_KERNEL in atomic context

Using GFPKERNEL in preemption disable context, causing below warning when CONFIGDEBUGATOMICSLEEP is enabled.

[ 32.542271] BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274 [ 32.550883] inatomic(): 1, irqsdisabled(): 0, nonblock: 0, pid: 1, name: swapper/0 [ 32.558707] preemptcount: 1, expected: 0 [ 32.562710] RCU nest depth: 0, expected: 0 [ 32.566800] CPU: 3 PID: 1 Comm: swapper/0 Tainted: G W 6.2.0-rc2-00269-gae9dcb91c606 #7 [ 32.576188] Hardware name: Marvell CN106XX board (DT) [ 32.581232] Call trace: [ 32.583670] dumpbacktrace.part.0+0xe0/0xf0 [ 32.587937] showstack+0x18/0x30 [ 32.591245] dumpstacklvl+0x68/0x84 [ 32.594900] dumpstack+0x18/0x34 [ 32.598206] _mightresched+0x12c/0x160 [ 32.602122] _mightsleep+0x48/0xa0 [ 32.605689] _kmemcacheallocnode+0x2b8/0x2e0 [ 32.610301] _kmalloc+0x58/0x190 [ 32.613610] otx2sqaurapoolinit+0x1a8/0x314 [ 32.618134] otx2_open+0x1d4/0x9d0

To avoid use of GFP_ATOMIC for memory allocation, disable preemption after all memory allocation is done.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53030.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
6ea5273c71dd2d07c0a2459594eb34bc087939f7
Fixed
2827c4eb429db64befdca11362e2b1c5f524f6ba
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
667ce030bdfb62a86266444b2c3fd6ab98b9df9b
Fixed
1eb57b87f106c90cee6b2a56a10f2e29c7a25f3e
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
4af1b64f80fbe1275fb02c5f1c0cef099a4a231f
Fixed
87b93b678e95c7d93fe6a55b0e0fbda26d8c7760
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
b754dc7c933dd9464223f64b10d33d68ab086cc6

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.15.87
Fixed
5.15.91
Type
ECOSYSTEM
Events
Introduced
6.1.5
Fixed
6.1.8