CVE-2024-42290

In the Linux kernel, the following vulnerability has been resolved: irqchip/imx-irqsteer: Handle runtime power management correctly The power domain is automatically activated from clk_prepare(). However, on certain platforms like i.MX8QM and i.MX8QXP, the power-on handling invokes sleeping functions, which triggers the 'scheduling while atomic' bug in the context switch path during device probing: BUG: scheduling while atomic: kworker/u13:1/48/0x00000002 Call trace: __schedule_bug+0x54/0x6c __schedule+0x7f0/0xa94 schedule+0x5c/0xc4 schedule_preempt_disabled+0x24/0x40 __mutex_lock.constprop.0+0x2c0/0x540 __mutex_lock_slowpath+0x14/0x20 mutex_lock+0x48/0x54 clk_prepare_lock+0x44/0xa0 clk_prepare+0x20/0x44 imx_irqsteer_resume+0x28/0xe0 pm_generic_runtime_resume+0x2c/0x44 __genpd_runtime_resume+0x30/0x80 genpd_runtime_resume+0xc8/0x2c0 __rpm_callback+0x48/0x1d8 rpm_callback+0x6c/0x78 rpm_resume+0x490/0x6b4 __pm_runtime_resume+0x50/0x94 irq_chip_pm_get+0x2c/0xa0 __irq_do_set_handler+0x178/0x24c irq_set_chained_handler_and_data+0x60/0xa4 mxc_gpio_probe+0x160/0x4b0 Cure this by implementing the irq_bus_lock/sync_unlock() interrupt chip callbacks and handle power management in them as they are invoked from non-atomic context. [ tglx: Rewrote change log, added Fixes tag ]
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

02 Oct 2025, 18:34

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE NVD-CWE-noinfo
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/21bd3f9e7f924cd2fc892a484e7a50c7e1847565 - () https://git.kernel.org/stable/c/21bd3f9e7f924cd2fc892a484e7a50c7e1847565 - Patch
References () https://git.kernel.org/stable/c/33b1c47d1fc0b5f06a393bb915db85baacba18ea - () https://git.kernel.org/stable/c/33b1c47d1fc0b5f06a393bb915db85baacba18ea - Patch
References () https://git.kernel.org/stable/c/3a2884a44e5cda192df1b28e9925661f79f599a1 - () https://git.kernel.org/stable/c/3a2884a44e5cda192df1b28e9925661f79f599a1 - Patch
References () https://git.kernel.org/stable/c/58c56735facb225a5c46fa4b8bbbe7f31d1cb894 - () https://git.kernel.org/stable/c/58c56735facb225a5c46fa4b8bbbe7f31d1cb894 - Patch
References () https://git.kernel.org/stable/c/a590e8dea3df2639921f874d763be961dd74e8f9 - () https://git.kernel.org/stable/c/a590e8dea3df2639921f874d763be961dd74e8f9 - Patch
References () https://git.kernel.org/stable/c/f8ae38f1dfe652779c7c613facbc257cec00ac44 - () https://git.kernel.org/stable/c/f8ae38f1dfe652779c7c613facbc257cec00ac44 - Patch
References () https://git.kernel.org/stable/c/fa1803401e1c360efe6342fb41d161cc51748a11 - () https://git.kernel.org/stable/c/fa1803401e1c360efe6342fb41d161cc51748a11 - Patch

19 Aug 2024, 12:59

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: irqchip/imx-irqsteer: manejar correctamente la administración de energía en tiempo de ejecución. El dominio de energía se activa automáticamente desde clk_prepare(). Sin embargo, en ciertas plataformas como i.MX8QM e i.MX8QXP, el manejo de encendido invoca funciones de suspensión, lo que desencadena el error de 'programación mientras es atómico' en la ruta de cambio de contexto durante la prueba del dispositivo: ERROR: programación mientras es atómico: kworker/u13 :1/48/0x00000002 Seguimiento de llamadas: __schedule_bug+0x54/0x6c __schedule+0x7f0/0xa94 Schedule+0x5c/0xc4 Schedule_preempt_disabled+0x24/0x40 __mutex_lock.constprop.0+0x2c0/0x540 __mutex_lock_slowpath+0x14/0 x20 mutex_lock+0x48/0x54 clk_prepare_lock+ 0x44/0xa0 clk_prepare+0x20/0x44 imx_irqsteer_resume+0x28/0xe0 pm_generic_runtime_resume+0x2c/0x44 __genpd_runtime_resume+0x30/0x80 genpd_runtime_resume+0xc8/0x2c0 __rpm_callback+0x48/0x1d8 rpm_callback+0x6c/0x78 rpm_resume+0x490/0x6b4 __pm_runtime_resume+0x50/0x94 irq_chip_pm_get+ 0x2c/0xa0 __irq_do_set_handler+0x178/0x24c irq_set_chained_handler_and_data+0x60/0xa4 mxc_gpio_probe+0x160/0x4b0 Solucione esto implementando las devoluciones de llamada del chip de interrupción irq_bus_lock/sync_unlock() y maneje la administración de energía en ellos a medida que se invocan desde un contexto no atómico. [tglx: registro de cambios reescrito, etiqueta de correcciones agregada]

19 Aug 2024, 05:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/3a2884a44e5cda192df1b28e9925661f79f599a1 -
  • () https://git.kernel.org/stable/c/a590e8dea3df2639921f874d763be961dd74e8f9 -
  • () https://git.kernel.org/stable/c/fa1803401e1c360efe6342fb41d161cc51748a11 -

17 Aug 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-17 09:15

Updated : 2025-10-02 18:34


NVD link : CVE-2024-42290

Mitre link : CVE-2024-42290

CVE.ORG link : CVE-2024-42290


JSON object : View

Products Affected

linux

  • linux_kernel