In the Linux kernel, the following vulnerability has been resolved:
spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks
The ->runtime_suspend() and ->runtime_resume() callbacks are not
expected to call spi_controller_suspend() and spi_controller_resume().
Remove calls to those in the cadence-qspi driver.
Those helpers have two roles currently:
- They stop/start the queue, including dealing with the kworker.
- They toggle the SPI controller SPI_CONTROLLER_SUSPENDED flag. It
requires acquiring ctlr->bus_lock_mutex.
Step one is irrelevant because cadence-qspi is not queued. Step two
however has two implications:
- A deadlock occurs, because ->runtime_resume() is called in a context
where the lock is already taken (in the ->exec_op() callback, where
the usage count is incremented).
- It would disallow all operations once the device is auto-suspended.
Here is a brief call tree highlighting the mutex deadlock:
spi_mem_exec_op()
...
spi_mem_access_start()
mutex_lock(&ctlr->bus_lock_mutex)
cqspi_exec_mem_op()
pm_runtime_resume_and_get()
cqspi_resume()
spi_controller_resume()
mutex_lock(&ctlr->bus_lock_mutex)
...
spi_mem_access_end()
mutex_unlock(&ctlr->bus_lock_mutex)
...
References
Configurations
Configuration 1 (hide)
|
History
27 Mar 2025, 21:30
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-667 | |
First Time |
Linux
Linux linux Kernel |
|
References | () https://git.kernel.org/stable/c/041562ebc4759c9932b59a06527f8753b86da365 - Patch | |
References | () https://git.kernel.org/stable/c/959043afe53ae80633e810416cee6076da6e91c6 - Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
21 Nov 2024, 09:03
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/041562ebc4759c9932b59a06527f8753b86da365 - | |
References | () https://git.kernel.org/stable/c/959043afe53ae80633e810416cee6076da6e91c6 - |
04 Apr 2024, 12:48
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
04 Apr 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-04 09:15
Updated : 2025-03-27 21:30
NVD link : CVE-2024-26806
Mitre link : CVE-2024-26806
CVE.ORG link : CVE-2024-26806
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-667
Improper Locking