In the Linux kernel, the following vulnerability has been resolved:
RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled
Fix missuse of spin_lock_irq()/spin_unlock_irq() when
spin_lock_irqsave()/spin_lock_irqrestore() was hold.
This was discovered through the lock debugging, and the corresponding
log is as follows:
raw_local_irq_restore() called with IRQs enabled
WARNING: CPU: 96 PID: 2074 at kernel/locking/irqflag-debug.c:10 warn_bogus_irq_restore+0x30/0x40
...
Call trace:
warn_bogus_irq_restore+0x30/0x40
_raw_spin_unlock_irqrestore+0x84/0xc8
add_qp_to_list+0x11c/0x148 [hns_roce_hw_v2]
hns_roce_create_qp_common.constprop.0+0x240/0x780 [hns_roce_hw_v2]
hns_roce_create_qp+0x98/0x160 [hns_roce_hw_v2]
create_qp+0x138/0x258
ib_create_qp_kernel+0x50/0xe8
create_mad_qp+0xa8/0x128
ib_mad_port_open+0x218/0x448
ib_mad_init_device+0x70/0x1f8
add_client_context+0xfc/0x220
enable_device_and_get+0xd0/0x140
ib_register_device.part.0+0xf4/0x1c8
ib_register_device+0x34/0x50
hns_roce_register_device+0x174/0x3d0 [hns_roce_hw_v2]
hns_roce_init+0xfc/0x2c0 [hns_roce_hw_v2]
__hns_roce_hw_v2_init_instance+0x7c/0x1d0 [hns_roce_hw_v2]
hns_roce_hw_v2_init_instance+0x9c/0x180 [hns_roce_hw_v2]
References
Configurations
Configuration 1 (hide)
|
History
23 Oct 2024, 21:00
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linux linux Kernel
Linux |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
CWE | CWE-667 | |
Summary |
|
|
References | () https://git.kernel.org/stable/c/07f0f643d7e570dbe8ef6f5c3367a43e3086a335 - Patch | |
References | () https://git.kernel.org/stable/c/094a1821903f33fb91de4b71087773ee16aeb3a0 - Patch | |
References | () https://git.kernel.org/stable/c/2656336a84fcb6802f6e6c233f4661891deea24f - Patch | |
References | () https://git.kernel.org/stable/c/29c0f546d3fd66238b42cf25bcd5f193bb1cf794 - Patch | |
References | () https://git.kernel.org/stable/c/425589d4af09c49574bd71ac31f811362a5126c3 - Patch | |
References | () https://git.kernel.org/stable/c/74d315b5af180220d561684d15897730135733a6 - Patch | |
References | () https://git.kernel.org/stable/c/a1a3403bb1826c8ec787f0d60c3e7b54f419129e - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
21 Oct 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-21 13:15
Updated : 2024-10-23 21:00
NVD link : CVE-2024-47735
Mitre link : CVE-2024-47735
CVE.ORG link : CVE-2024-47735
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-667
Improper Locking