CVE-2022-49606
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/02/2025
Last modified:
26/02/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
RDMA/irdma: Fix sleep from invalid context BUG<br />
<br />
Taking the qos_mutex to process RoCEv2 QP&#39;s on netdev events causes a<br />
kernel splat.<br />
<br />
Fix this by removing the handling for RoCEv2 in<br />
irdma_cm_teardown_connections that uses the mutex. This handling is only<br />
needed for iWARP to avoid having connections established while the link is<br />
down or having connections remain functional after the IP address is<br />
removed.<br />
<br />
BUG: sleeping function called from invalid context at kernel/locking/mutex.<br />
Call Trace:<br />
kernel: dump_stack+0x66/0x90<br />
kernel: ___might_sleep.cold.92+0x8d/0x9a<br />
kernel: mutex_lock+0x1c/0x40<br />
kernel: irdma_cm_teardown_connections+0x28e/0x4d0 [irdma]<br />
kernel: ? check_preempt_curr+0x7a/0x90<br />
kernel: ? select_idle_sibling+0x22/0x3c0<br />
kernel: ? select_task_rq_fair+0x94c/0xc90<br />
kernel: ? irdma_exec_cqp_cmd+0xc27/0x17c0 [irdma]<br />
kernel: ? __wake_up_common+0x7a/0x190<br />
kernel: irdma_if_notify+0x3cc/0x450 [irdma]<br />
kernel: ? sched_clock_cpu+0xc/0xb0<br />
kernel: irdma_inet6addr_event+0xc6/0x150 [irdma]