CVE-2024-47735

In the Linux kernel, the following vulnerability has been resolved: RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled Fix missuse of spin_lock_irq()/spin_unlock_irq() when spin_lock_irqsave()/spin_lock_irqrestore() was hold. This was discovered through the lock debugging, and the corresponding log is as follows: raw_local_irq_restore() called with IRQs enabled WARNING: CPU: 96 PID: 2074 at kernel/locking/irqflag-debug.c:10 warn_bogus_irq_restore+0x30/0x40 ... Call trace: warn_bogus_irq_restore+0x30/0x40 _raw_spin_unlock_irqrestore+0x84/0xc8 add_qp_to_list+0x11c/0x148 [hns_roce_hw_v2] hns_roce_create_qp_common.constprop.0+0x240/0x780 [hns_roce_hw_v2] hns_roce_create_qp+0x98/0x160 [hns_roce_hw_v2] create_qp+0x138/0x258 ib_create_qp_kernel+0x50/0xe8 create_mad_qp+0xa8/0x128 ib_mad_port_open+0x218/0x448 ib_mad_init_device+0x70/0x1f8 add_client_context+0xfc/0x220 enable_device_and_get+0xd0/0x140 ib_register_device.part.0+0xf4/0x1c8 ib_register_device+0x34/0x50 hns_roce_register_device+0x174/0x3d0 [hns_roce_hw_v2] hns_roce_init+0xfc/0x2c0 [hns_roce_hw_v2] __hns_roce_hw_v2_init_instance+0x7c/0x1d0 [hns_roce_hw_v2] hns_roce_hw_v2_init_instance+0x9c/0x180 [hns_roce_hw_v2]
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

23 Oct 2024, 21:00

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-667
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/hns: Se corrige el error spin_unlock_irqrestore() llamado con IRQ habilitadas Se corrige el uso incorrecto de spin_lock_irq()/spin_unlock_irq() cuando spin_lock_irqsave()/spin_lock_irqrestore() estaba retenido. Esto se descubrió a través de la depuración de bloqueo, y el registro correspondiente es el siguiente: raw_local_irq_restore() llamado con IRQs habilitados ADVERTENCIA: CPU: 96 PID: 2074 en kernel/locking/irqflag-debug.c:10 warn_bogus_irq_restore+0x30/0x40 ... Rastreo de llamada: warn_bogus_irq_restore+0x30/0x40 _raw_spin_unlock_irqrestore+0x84/0xc8 add_qp_to_list+0x11c/0x148 [hns_roce_hw_v2] hns_r_cocereate_qp_common.constprop.0+0x240/0x780 [hns_roce_hw_v2] hns_roce_create_qp+0x98/0x160 [hns_roce_hw_v2] create_qp+0x138/0x258 ib_create_qp_kernel+0x50/0xe8 create_mad_qp+0xa8/0x128 ib_mad_port_open+0x218/0x448 ib_mad_init_device+0x70/0x1f8 add_client_context+0xfc/0x220 enable_device_and_get+0xd0/0x140 ib_register_device.part.0+0xf4/0x1c8 ib_register_device+0x34/0x50 hns_roce_register_device+0x174/0x3d0 [hns_roce_hw_v2] hns_roce_init+0xfc/0x2c0 [hns_roce_hw_v2] __hns_roce_hw_v2_init_instance+0x7c/0x1d0 [hns_roce_hw_v2] hns_roce_hw_v2_init_instance+0x9c/0x180 [hns_roce_hw_v2]
References () https://git.kernel.org/stable/c/07f0f643d7e570dbe8ef6f5c3367a43e3086a335 - () https://git.kernel.org/stable/c/07f0f643d7e570dbe8ef6f5c3367a43e3086a335 - Patch
References () https://git.kernel.org/stable/c/094a1821903f33fb91de4b71087773ee16aeb3a0 - () https://git.kernel.org/stable/c/094a1821903f33fb91de4b71087773ee16aeb3a0 - Patch
References () https://git.kernel.org/stable/c/2656336a84fcb6802f6e6c233f4661891deea24f - () https://git.kernel.org/stable/c/2656336a84fcb6802f6e6c233f4661891deea24f - Patch
References () https://git.kernel.org/stable/c/29c0f546d3fd66238b42cf25bcd5f193bb1cf794 - () https://git.kernel.org/stable/c/29c0f546d3fd66238b42cf25bcd5f193bb1cf794 - Patch
References () https://git.kernel.org/stable/c/425589d4af09c49574bd71ac31f811362a5126c3 - () https://git.kernel.org/stable/c/425589d4af09c49574bd71ac31f811362a5126c3 - Patch
References () https://git.kernel.org/stable/c/74d315b5af180220d561684d15897730135733a6 - () https://git.kernel.org/stable/c/74d315b5af180220d561684d15897730135733a6 - Patch
References () https://git.kernel.org/stable/c/a1a3403bb1826c8ec787f0d60c3e7b54f419129e - () https://git.kernel.org/stable/c/a1a3403bb1826c8ec787f0d60c3e7b54f419129e - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

21 Oct 2024, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-21 13:15

Updated : 2024-10-23 21:00


NVD link : CVE-2024-47735

Mitre link : CVE-2024-47735

CVE.ORG link : CVE-2024-47735


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-667

Improper Locking