CVE-2023-53811
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
09/12/2025
Última modificación:
09/12/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
RDMA/irdma: Cap MSIX used to online CPUs + 1<br />
<br />
The irdma driver can use a maximum number of msix vectors equal<br />
to num_online_cpus() + 1 and the kernel warning stack below is shown<br />
if that number is exceeded.<br />
<br />
The kernel throws a warning as the driver tries to update the affinity<br />
hint with a CPU mask greater than the max CPU IDs. Fix this by capping<br />
the MSIX vectors to num_online_cpus() + 1.<br />
<br />
WARNING: CPU: 7 PID: 23655 at include/linux/cpumask.h:106 irdma_cfg_ceq_vector+0x34c/0x3f0 [irdma]<br />
RIP: 0010:irdma_cfg_ceq_vector+0x34c/0x3f0 [irdma]<br />
Call Trace:<br />
irdma_rt_init_hw+0xa62/0x1290 [irdma]<br />
? irdma_alloc_local_mac_entry+0x1a0/0x1a0 [irdma]<br />
? __is_kernel_percpu_address+0x63/0x310<br />
? rcu_read_lock_held_common+0xe/0xb0<br />
? irdma_lan_unregister_qset+0x280/0x280 [irdma]<br />
? irdma_request_reset+0x80/0x80 [irdma]<br />
? ice_get_qos_params+0x84/0x390 [ice]<br />
irdma_probe+0xa40/0xfc0 [irdma]<br />
? rcu_read_lock_bh_held+0xd0/0xd0<br />
? irdma_remove+0x140/0x140 [irdma]<br />
? rcu_read_lock_sched_held+0x62/0xe0<br />
? down_write+0x187/0x3d0<br />
? auxiliary_match_id+0xf0/0x1a0<br />
? irdma_remove+0x140/0x140 [irdma]<br />
auxiliary_bus_probe+0xa6/0x100<br />
__driver_probe_device+0x4a4/0xd50<br />
? __device_attach_driver+0x2c0/0x2c0<br />
driver_probe_device+0x4a/0x110<br />
__driver_attach+0x1aa/0x350<br />
bus_for_each_dev+0x11d/0x1b0<br />
? subsys_dev_iter_init+0xe0/0xe0<br />
bus_add_driver+0x3b1/0x610<br />
driver_register+0x18e/0x410<br />
? 0xffffffffc0b88000<br />
irdma_init_module+0x50/0xaa [irdma]<br />
do_one_initcall+0x103/0x5f0<br />
? perf_trace_initcall_level+0x420/0x420<br />
? do_init_module+0x4e/0x700<br />
? __kasan_kmalloc+0x7d/0xa0<br />
? kmem_cache_alloc_trace+0x188/0x2b0<br />
? kasan_unpoison+0x21/0x50<br />
do_init_module+0x1d1/0x700<br />
load_module+0x3867/0x5260<br />
? layout_and_allocate+0x3990/0x3990<br />
? rcu_read_lock_held_common+0xe/0xb0<br />
? rcu_read_lock_sched_held+0x62/0xe0<br />
? rcu_read_lock_bh_held+0xd0/0xd0<br />
? __vmalloc_node_range+0x46b/0x890<br />
? lock_release+0x5c8/0xba0<br />
? alloc_vm_area+0x120/0x120<br />
? selinux_kernel_module_from_file+0x2a5/0x300<br />
? __inode_security_revalidate+0xf0/0xf0<br />
? __do_sys_init_module+0x1db/0x260<br />
__do_sys_init_module+0x1db/0x260<br />
? load_module+0x5260/0x5260<br />
? do_syscall_64+0x22/0x450<br />
do_syscall_64+0xa5/0x450<br />
entry_SYSCALL_64_after_hwframe+0x66/0xdb



