CVE-2023-53656
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
07/10/2025
Last modified:
08/10/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drivers/perf: hisi: Don&#39;t migrate perf to the CPU going to teardown<br />
<br />
The driver needs to migrate the perf context if the current using CPU going<br />
to teardown. By the time calling the cpuhp::teardown() callback the<br />
cpu_online_mask() hasn&#39;t updated yet and still includes the CPU going to<br />
teardown. In current driver&#39;s implementation we may migrate the context<br />
to the teardown CPU and leads to the below calltrace:<br />
<br />
...<br />
[ 368.104662][ T932] task:cpuhp/0 state:D stack: 0 pid: 15 ppid: 2 flags:0x00000008<br />
[ 368.113699][ T932] Call trace:<br />
[ 368.116834][ T932] __switch_to+0x7c/0xbc<br />
[ 368.120924][ T932] __schedule+0x338/0x6f0<br />
[ 368.125098][ T932] schedule+0x50/0xe0<br />
[ 368.128926][ T932] schedule_preempt_disabled+0x18/0x24<br />
[ 368.134229][ T932] __mutex_lock.constprop.0+0x1d4/0x5dc<br />
[ 368.139617][ T932] __mutex_lock_slowpath+0x1c/0x30<br />
[ 368.144573][ T932] mutex_lock+0x50/0x60<br />
[ 368.148579][ T932] perf_pmu_migrate_context+0x84/0x2b0<br />
[ 368.153884][ T932] hisi_pcie_pmu_offline_cpu+0x90/0xe0 [hisi_pcie_pmu]<br />
[ 368.160579][ T932] cpuhp_invoke_callback+0x2a0/0x650<br />
[ 368.165707][ T932] cpuhp_thread_fun+0xe4/0x190<br />
[ 368.170316][ T932] smpboot_thread_fn+0x15c/0x1a0<br />
[ 368.175099][ T932] kthread+0x108/0x13c<br />
[ 368.179012][ T932] ret_from_fork+0x10/0x18<br />
...<br />
<br />
Use function cpumask_any_but() to find one correct active cpu to fixes<br />
this issue.



