{"id":"CVE-2024-38598","summary":"md: fix resync softlockup when bitmap size is less than array size","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmd: fix resync softlockup when bitmap size is less than array size\n\nIs is reported that for dm-raid10, lvextend + lvchange --syncaction will\ntrigger following softlockup:\n\nkernel:watchdog: BUG: soft lockup - CPU#3 stuck for 26s! [mdX_resync:6976]\nCPU: 7 PID: 3588 Comm: mdX_resync Kdump: loaded Not tainted 6.9.0-rc4-next-20240419 #1\nRIP: 0010:_raw_spin_unlock_irq+0x13/0x30\nCall Trace:\n \u003cTASK\u003e\n md_bitmap_start_sync+0x6b/0xf0\n raid10_sync_request+0x25c/0x1b40 [raid10]\n md_do_sync+0x64b/0x1020\n md_thread+0xa7/0x170\n kthread+0xcf/0x100\n ret_from_fork+0x30/0x50\n ret_from_fork_asm+0x1a/0x30\n\nAnd the detailed process is as follows:\n\nmd_do_sync\n j = mddev-\u003eresync_min\n while (j \u003c max_sectors)\n  sectors = raid10_sync_request(mddev, j, &skipped)\n   if (!md_bitmap_start_sync(..., &sync_blocks))\n    // md_bitmap_start_sync set sync_blocks to 0\n    return sync_blocks + sectors_skippe;\n  // sectors = 0;\n  j += sectors;\n  // j never change\n\nRoot cause is that commit 301867b1c168 (\"md/raid10: check\nslab-out-of-bounds in md_bitmap_get_counter\") return early from\nmd_bitmap_get_counter(), without setting returned blocks.\n\nFix this problem by always set returned blocks from\nmd_bitmap_get_counter\"(), as it used to be.\n\nNoted that this patch just fix the softlockup problem in kernel, the\ncase that bitmap size doesn't match array size still need to be fixed.","modified":"2026-04-02T12:16:53.519279Z","published":"2024-06-19T13:45:47.309Z","related":["MGASA-2024-0263","MGASA-2024-0266","SUSE-SU-2024:2493-1","SUSE-SU-2024:2561-1","SUSE-SU-2024:2802-1","SUSE-SU-2024:2894-1","SUSE-SU-2024:2896-1","SUSE-SU-2024:2901-1","SUSE-SU-2024:2939-1","SUSE-SU-2024:2947-1","SUSE-SU-2024:2973-1","SUSE-SU-2025:20008-1","SUSE-SU-2025:20028-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/38xxx/CVE-2024-38598.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/3f5b73ef8fd6268cbc968b308d8eafe56fda97f3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/43771597feba89a839c5f893716df88ae5c237ce"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5817f43ae1a118855676f57ef7ab50e37eac7482"},{"type":"WEB","url":"https://git.kernel.org/stable/c/69296914bfd508c85935bf5f711cad9b0fe78492"},{"type":"WEB","url":"https://git.kernel.org/stable/c/71e8e4f288e74a896b6d9cd194f3bab12bd7a10f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8bbc71315e0ae4bb7e37f8d43b915e1cb01a481b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c9566b812c8f66160466cc1e29df6d3646add0b1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d4b9c764d48fa41caa24cfb4275f3aa9fb4bd798"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f0e729af2eb6bee9eb58c4df1087f14ebaefe26b"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/38xxx/CVE-2024-38598.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38598"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"374fb914304d9b500721007f3837ea8f1f9a2418"},{"fixed":"d4b9c764d48fa41caa24cfb4275f3aa9fb4bd798"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"b0b971fe7d61411ede63c3291764dbde1577ef2c"},{"fixed":"43771597feba89a839c5f893716df88ae5c237ce"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"39fa14e824acfd470db4f42c354297456bd82b53"},{"fixed":"3f5b73ef8fd6268cbc968b308d8eafe56fda97f3"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"a134dd582c0d5b6068efa308bd485cf1d00b3f65"},{"fixed":"69296914bfd508c85935bf5f711cad9b0fe78492"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"be1a3ec63a840cc9e59a033acf154f56255699a1"},{"fixed":"71e8e4f288e74a896b6d9cd194f3bab12bd7a10f"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"301867b1c16805aebbc306aafa6ecdc68b73c7e5"},{"fixed":"c9566b812c8f66160466cc1e29df6d3646add0b1"},{"fixed":"5817f43ae1a118855676f57ef7ab50e37eac7482"},{"fixed":"8bbc71315e0ae4bb7e37f8d43b915e1cb01a481b"},{"fixed":"f0e729af2eb6bee9eb58c4df1087f14ebaefe26b"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"152bb26796ff054af50b2ee1b3ca56e364e4f61b"},{"last_affected":"bea301c046110bf421a3ce153fb868cb8d618e90"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-38598.json"}}],"schema_version":"1.7.5"}