In the Linux kernel, the following vulnerability has been resolved:net/mlx5e: Fix mlx5e_priv_init() cleanup flowWhen mlx5e_priv_init() fails, the cleanup flow calls mlx5e_selq_cleanup whichcalls mlx5e_selq_apply() that assures that the `priv->state_lock` is held usinglockdep_is_held().Acquire the state_lock in mlx5e_selq_cleanup().Kernel log:=============================WARNING: suspicious RCU usage6.8.0-rc3_net_next_841a9b5 #1 Not tainted-----------------------------drivers/net/ethernet/mellanox/mlx5/core/en/selq.c:124 suspicious rcu_dereference_protected() usage!other info that might help us debug this:rcu_scheduler_active = 2, debug_locks = 12 locks held by systemd-modules/293: #0: ffffffffa05067b0 (devices_rwsem){++++}-{3:3}, at: ib_register_client+0x109/0x1b0 [ib_core] #1: ffff8881096c65c0 (&device->client_data_rwsem){++++}-{3:3}, at: add_client_context+0x104/0x1c0 [ib_core]stack backtrace:CPU: 4 PID: 293 Comm: systemd-modules Not tainted 6.8.0-rc3_net_next_841a9b5 #1Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014Call Trace:
No PoCs from references.
- https://github.com/ARPSyndicate/cve-scores