CVE-2024-47735

Source
https://cve.org/CVERecord?id=CVE-2024-47735
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-47735.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-47735
Downstream
Related
Published
2024-10-21T12:14:05.876Z
Modified
2026-05-07T04:16:11.582348Z
Summary
RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled
Details

In the Linux kernel, the following vulnerability has been resolved:

RDMA/hns: Fix spinunlockirqrestore() called with IRQs enabled

Fix missuse of spinlockirq()/spinunlockirq() when spinlockirqsave()/spinlockirqrestore() was hold.

This was discovered through the lock debugging, and the corresponding log is as follows:

rawlocalirqrestore() called with IRQs enabled WARNING: CPU: 96 PID: 2074 at kernel/locking/irqflag-debug.c:10 warnbogusirqrestore+0x30/0x40 ... Call trace: warnbogusirqrestore+0x30/0x40 rawspinunlockirqrestore+0x84/0xc8 addqptolist+0x11c/0x148 [hnsrocehwv2] hnsrocecreateqpcommon.constprop.0+0x240/0x780 [hnsrocehwv2] hnsrocecreateqp+0x98/0x160 [hnsrocehwv2] createqp+0x138/0x258 ibcreateqpkernel+0x50/0xe8 createmadqp+0xa8/0x128 ibmadportopen+0x218/0x448 ibmadinitdevice+0x70/0x1f8 addclientcontext+0xfc/0x220 enabledeviceandget+0xd0/0x140 ibregisterdevice.part.0+0xf4/0x1c8 ibregisterdevice+0x34/0x50 hnsroceregisterdevice+0x174/0x3d0 [hnsrocehwv2] hnsroceinit+0xfc/0x2c0 [hnsrocehwv2] __hnsrocehwv2initinstance+0x7c/0x1d0 [hnsrocehwv2] hnsrocehwv2initinstance+0x9c/0x180 [hnsrocehwv2]

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/47xxx/CVE-2024-47735.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
9a4435375cd151e07c0c38fa601b00115986091b
Fixed
07f0f643d7e570dbe8ef6f5c3367a43e3086a335
Fixed
29c0f546d3fd66238b42cf25bcd5f193bb1cf794
Fixed
425589d4af09c49574bd71ac31f811362a5126c3
Fixed
094a1821903f33fb91de4b71087773ee16aeb3a0
Fixed
2656336a84fcb6802f6e6c233f4661891deea24f
Fixed
a1a3403bb1826c8ec787f0d60c3e7b54f419129e
Fixed
74d315b5af180220d561684d15897730135733a6

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-47735.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.9.0
Fixed
5.10.227
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.168
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.113
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.54
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.10.13
Type
ECOSYSTEM
Events
Introduced
6.11.0
Fixed
6.11.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-47735.json"