magic != lock) WARNING: CPU: 0 PID: 410 at kernel/locking/mutex.c:587 __mutex_lock+0x773/0xd40 Modules linked in: crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic ice(+) nvme nvme_c> CPU: 0 PID: 410 Comm: kworker/0:4 Not tainted 6.8.0-rc5+ #3 Hardware name: HPE ProLiant DL110 Gen10 Plus/ProLiant DL110 Gen10 Plus, BIOS U56 10/19/2023 Workqueue: events work_for_cpu_fn RIP: 0010:__mutex_lock+0x773/0xd40 Code: c0 0f 84 1d f9 ff ff 44 8b 35 0d 9c 69 01 45 85 f6 0f 85 0d f9 ff ff 48 c7 c6 12 a2 a9 85 48 c7 c7 12 f1 a> RSP: 0018:ff7eb1a3417a7ae0 EFLAGS: 00010286 RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000000 RDX: 0000000000000002 RSI: ffffffff85ac2bff RDI: 00000000ffffffff RBP: ff7eb1a3417a7b80 R08: 0000000000000000 R09: 00000000ffffbfff R10: ff7eb1a3417a7978 R11: ff32b80f7fd2e568 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: ff32b7f02c50e0d8 FS: 0000000000000000(0000) GS:ff32b80efe800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055b5852cc000 CR3: 000000003c43a004 CR4: 0000000000771ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 PKRU: 55555554 Call Trace: ? __warn+0x84/0x170 ? __mutex_lock+0x773/0xd40 ? report_bug+0x1c7/0x1d0 ? prb_read_valid+0x1b/0x30 ? handle_bug+0x42/0x70 ? exc_invalid_op+0x18/0x70 ? asm_exc_invalid_op+0x1a/0x20 ? __mutex_lock+0x773/0xd40 ? rcu_is_watching+0x11/0x50 ? __kmalloc_node_track_caller+0x346/0x490 ? ice_dpll_lock_status_get+0x28/0x50 [ice] ? __pfx_ice_dpll_lock_status_get+0x10/0x10 [ice] ? ice_dpll_lock_status_get+0x28/0x50 [ice] ice_dpll_lock_status_get+0x28/0x50 [ice] dpll_device_get_one+0x14f/0x2e0 dpll_device_event_send+0x7d/0x150 dpll_device_register+0x124/0x180 ice_dpll_init_dpll+0x7b/0xd0 [ice] ice_dpll_init+0x224/0xa40 [ice] ? _dev_info+0x70/0x90 ice_load+0x468/0x690 [ice] ice_probe+0x75b/0xa10 [ice] ? _raw_spin_unlock_irqrestore+0x4f/0x80 ? process_one_work+0x1a3/0x500 local_pci_probe+0x47/0xa0 work_for_cpu_fn+0x17/0x30 process_one_work+0x20d/0x500 worker_thread+0x1df/0x3e0 ? __pfx_worker_thread+0x10/0x10 kthread+0x103/0x140 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x31/0x50 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1b/0x30 irq event stamp: 125197 hardirqs last enabled at (125197): [] finish_task_switch.isra.0+0x12d/0x3d0 hardirqs last disabled at (125196): [] __schedule+0xea4/0x19f0 softirqs last enabled at (105334): [] napi_get_frags_check+0x1a/0x60 softirqs last disabled at (105332): [] napi_get_frags_check+0x1a/0x60 ---[ end trace 0000000000000000 ]--- "> magic,!=,lock),WARNING:,CPU:,0,PID:,410,at kernel/locking/mutex.c:587,__mutex_lock+0x773/0xd40,Modules,linked,in: crct10dif_pclmul,crc32_pclmul,crc32c_intel,polyval_clmulni polyval_generic,ice(+),nvme,nvme_c>,CPU:,0,PID:,410,Comm:,kworker/0:4 Not,tainted,6.8.0-rc5+,#3,Hardware,name:,HPE,ProLiant,DL110,Gen10 Plus/ProLiant,DL110,Gen10,Plus,,BIOS,U56,10/19/2023,Workqueue:,events work_for_cpu_fn,RIP:,0010:__mutex_lock+0x773/0xd40,Code:,c0,0f,84,1d f9,ff,ff,44,8b,35,0d,9c,69,01,45,85,f6,0f,85,0d,f9,ff,ff,48,c7,c6,12 a2,a9,85,48,c7,c7,12,f1,a>,RSP:,0018:ff7eb1a3417a7ae0,EFLAGS:,00010286 RAX:,0000000000000000,RBX:,0000000000000002,RCX:,0000000000000000,RDX: 0000000000000002,RSI:,ffffffff85ac2bff,RDI:,00000000ffffffff,RBP: ff7eb1a3417a7b80,R08:,0000000000000000,R09:,00000000ffffbfff,R10: ff7eb1a3417a7978,R11:,ff32b80f7fd2e568,R12:,0000000000000000,R13: 0000000000000000,R14:,0000000000000000,R15:,ff32b7f02c50e0d8,FS: 0000000000000000(0000),GS:ff32b80efe800000(0000) knlGS:0000000000000000,CS:,0010,DS:,0000,ES:,0000,CR0: 0000000080050033,CR2:,000055b5852cc000,CR3:,000000003c43a004,CR4: 0000000000771ef0,DR0:,0000000000000000,DR1:,0000000000000000,DR2: 0000000000000000,DR3:,0000000000000000,DR6:,00000000fffe0ff0,DR7: 0000000000000400,PKRU:,55555554,Call,Trace:,,?,__warn+0x84/0x170 ?,__mutex_lock+0x773/0xd40,?,report_bug+0x1c7/0x1d0,? prb_read_valid+0x1b/0x30,?,handle_bug+0x42/0x70,? exc_invalid_op+0x18/0x70,?,asm_exc_invalid_op+0x1a/0x20,? __mutex_lock+0x773/0xd40,?,rcu_is_watching+0x11/0x50,? __kmalloc_node_track_caller+0x346/0x490,? ice_dpll_lock_status_get+0x28/0x50,[ice],? __pfx_ice_dpll_lock_status_get+0x10/0x10,[ice],? ice_dpll_lock_status_get+0x28/0x50,[ice] ice_dpll_lock_status_get+0x28/0x50,[ice] dpll_device_get_one+0x14f/0x2e0,dpll_device_event_send+0x7d/0x150 dpll_device_register+0x124/0x180,ice_dpll_init_dpll+0x7b/0xd0,[ice] ice_dpll_init+0x224/0xa40,[ice],?,_dev_info+0x70/0x90 ice_load+0x468/0x690,[ice],ice_probe+0x75b/0xa10,[ice],? _raw_spin_unlock_irqrestore+0x4f/0x80,?,process_one_work+0x1a3/0x500 local_pci_probe+0x47/0xa0,work_for_cpu_fn+0x17/0x30 process_one_work+0x20d/0x500,worker_thread+0x1df/0x3e0,? __pfx_worker_thread+0x10/0x10,kthread+0x103/0x140,? __pfx_kthread+0x10/0x10,ret_from_fork+0x31/0x50,? __pfx_kthread+0x10/0x10,ret_from_fork_asm+0x1b/0x30,,irq,event stamp:,125197,hardirqs,last,enabled,at,(125197):,[] finish_task_switch.isra.0+0x12d/0x3d0,hardirqs,last,disabled,at (125196):,[],__schedule+0xea4/0x19f0,softirqs,last enabled,at,(105334):,[] napi_get_frags_check+0x1a/0x60,softirqs,last,disabled,at,(105332): [],napi_get_frags_check+0x1a/0x60,---[,end,trace 0000000000000000,]--- "> SecuritySpace - CVE-2024-26854
 
 
 Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2024-26854
Description:In the Linux kernel, the following vulnerability has been resolved: ice: fix uninitialized dplls mutex usage The pf->dplls.lock mutex is initialized too late, after its first use. Move it to the top of ice_dpll_init. Note that the "err_exit" error path destroys the mutex. And the mutex is the last thing destroyed in ice_dpll_deinit. This fixes the following warning with CONFIG_DEBUG_MUTEXES: ice 0000:10:00.0: The DDP package was successfully loaded: ICE OS Default Package version 1.3.36.0 ice 0000:10:00.0: 252.048 Gb/s available PCIe bandwidth (16.0 GT/s PCIe x16 link) ice 0000:10:00.0: PTP init successful ------------[ cut here ]------------ DEBUG_LOCKS_WARN_ON(lock->magic != lock) WARNING: CPU: 0 PID: 410 at kernel/locking/mutex.c:587 __mutex_lock+0x773/0xd40 Modules linked in: crct10dif_pclmul crc32_pclmul crc32c_intel polyval_clmulni polyval_generic ice(+) nvme nvme_c> CPU: 0 PID: 410 Comm: kworker/0:4 Not tainted 6.8.0-rc5+ #3 Hardware name: HPE ProLiant DL110 Gen10 Plus/ProLiant DL110 Gen10 Plus, BIOS U56 10/19/2023 Workqueue: events work_for_cpu_fn RIP: 0010:__mutex_lock+0x773/0xd40 Code: c0 0f 84 1d f9 ff ff 44 8b 35 0d 9c 69 01 45 85 f6 0f 85 0d f9 ff ff 48 c7 c6 12 a2 a9 85 48 c7 c7 12 f1 a> RSP: 0018:ff7eb1a3417a7ae0 EFLAGS: 00010286 RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000000 RDX: 0000000000000002 RSI: ffffffff85ac2bff RDI: 00000000ffffffff RBP: ff7eb1a3417a7b80 R08: 0000000000000000 R09: 00000000ffffbfff R10: ff7eb1a3417a7978 R11: ff32b80f7fd2e568 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: ff32b7f02c50e0d8 FS: 0000000000000000(0000) GS:ff32b80efe800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055b5852cc000 CR3: 000000003c43a004 CR4: 0000000000771ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 PKRU: 55555554 Call Trace: ? __warn+0x84/0x170 ? __mutex_lock+0x773/0xd40 ? report_bug+0x1c7/0x1d0 ? prb_read_valid+0x1b/0x30 ? handle_bug+0x42/0x70 ? exc_invalid_op+0x18/0x70 ? asm_exc_invalid_op+0x1a/0x20 ? __mutex_lock+0x773/0xd40 ? rcu_is_watching+0x11/0x50 ? __kmalloc_node_track_caller+0x346/0x490 ? ice_dpll_lock_status_get+0x28/0x50 [ice] ? __pfx_ice_dpll_lock_status_get+0x10/0x10 [ice] ? ice_dpll_lock_status_get+0x28/0x50 [ice] ice_dpll_lock_status_get+0x28/0x50 [ice] dpll_device_get_one+0x14f/0x2e0 dpll_device_event_send+0x7d/0x150 dpll_device_register+0x124/0x180 ice_dpll_init_dpll+0x7b/0xd0 [ice] ice_dpll_init+0x224/0xa40 [ice] ? _dev_info+0x70/0x90 ice_load+0x468/0x690 [ice] ice_probe+0x75b/0xa10 [ice] ? _raw_spin_unlock_irqrestore+0x4f/0x80 ? process_one_work+0x1a3/0x500 local_pci_probe+0x47/0xa0 work_for_cpu_fn+0x17/0x30 process_one_work+0x20d/0x500 worker_thread+0x1df/0x3e0 ? __pfx_worker_thread+0x10/0x10 kthread+0x103/0x140 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x31/0x50 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1b/0x30 irq event stamp: 125197 hardirqs last enabled at (125197): [] finish_task_switch.isra.0+0x12d/0x3d0 hardirqs last disabled at (125196): [] __schedule+0xea4/0x19f0 softirqs last enabled at (105334): [] napi_get_frags_check+0x1a/0x60 softirqs last disabled at (105332): [] napi_get_frags_check+0x1a/0x60 ---[ end trace 0000000000000000 ]---
Test IDs: None available
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2024-26854
https://git.kernel.org/stable/c/9224fc86f1776193650a33a275cac628952f80a9
https://git.kernel.org/stable/c/9224fc86f1776193650a33a275cac628952f80a9
https://git.kernel.org/stable/c/db29ceff3e25c48907016da456a7cbee6310fd83
https://git.kernel.org/stable/c/db29ceff3e25c48907016da456a7cbee6310fd83




© 1998-2025 E-Soft Inc. All rights reserved.