In the Linux kernel, the following vulnerability has been resolved:
spi: cadence-qspi: remove system-wide suspend helper calls from runtime PM hooks
The ->runtime_suspend() and ->runtime_resume() callbacks are not
expected to call spi_controller_suspend() and spi_controller_resume().
Remove calls to those in the cadence-qspi driver.
Those helpers have two roles currently:
 - They stop/start the queue, including dealing with the kworker.
 - They toggle the SPI controller SPI_CONTROLLER_SUSPENDED flag. It
   requires acquiring ctlr->bus_lock_mutex.
Step one is irrelevant because cadence-qspi is not queued. Step two
however has two implications:
 - A deadlock occurs, because ->runtime_resume() is called in a context
   where the lock is already taken (in the ->exec_op() callback, where
   the usage count is incremented).
 - It would disallow all operations once the device is auto-suspended.
Here is a brief call tree highlighting the mutex deadlock:
spi_mem_exec_op()
        ...
        spi_mem_access_start()
                mutex_lock(&ctlr->bus_lock_mutex)
        cqspi_exec_mem_op()
                pm_runtime_resume_and_get()
                        cqspi_resume()
                                spi_controller_resume()
                                        mutex_lock(&ctlr->bus_lock_mutex)
                ...
        spi_mem_access_end()
                mutex_unlock(&ctlr->bus_lock_mutex)
        ...
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    27 Mar 2025, 21:30
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://git.kernel.org/stable/c/041562ebc4759c9932b59a06527f8753b86da365 - Patch | |
| References | () https://git.kernel.org/stable/c/959043afe53ae80633e810416cee6076da6e91c6 - Patch | |
| CPE | cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:* | |
| CWE | CWE-667 | |
| First Time | Linux linux Kernel Linux | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 5.5 | 
Information
                Published : 2024-04-04 09:15
Updated : 2025-03-27 21:30
NVD link : CVE-2024-26806
Mitre link : CVE-2024-26806
CVE.ORG link : CVE-2024-26806
JSON object : View
Products Affected
                linux
- linux_kernel
CWE
                
                    
                        
                        CWE-667
                        
            Improper Locking
