CVE-2024-42290

In the Linux kernel, the following vulnerability has been resolved: irqchip/imx-irqsteer: Handle runtime power management correctly The power domain is automatically activated from clk_prepare(). However, on certain platforms like i.MX8QM and i.MX8QXP, the power-on handling invokes sleeping functions, which triggers the 'scheduling while atomic' bug in the context switch path during device probing: BUG: scheduling while atomic: kworker/u13:1/48/0x00000002 Call trace: __schedule_bug+0x54/0x6c __schedule+0x7f0/0xa94 schedule+0x5c/0xc4 schedule_preempt_disabled+0x24/0x40 __mutex_lock.constprop.0+0x2c0/0x540 __mutex_lock_slowpath+0x14/0x20 mutex_lock+0x48/0x54 clk_prepare_lock+0x44/0xa0 clk_prepare+0x20/0x44 imx_irqsteer_resume+0x28/0xe0 pm_generic_runtime_resume+0x2c/0x44 __genpd_runtime_resume+0x30/0x80 genpd_runtime_resume+0xc8/0x2c0 __rpm_callback+0x48/0x1d8 rpm_callback+0x6c/0x78 rpm_resume+0x490/0x6b4 __pm_runtime_resume+0x50/0x94 irq_chip_pm_get+0x2c/0xa0 __irq_do_set_handler+0x178/0x24c irq_set_chained_handler_and_data+0x60/0xa4 mxc_gpio_probe+0x160/0x4b0 Cure this by implementing the irq_bus_lock/sync_unlock() interrupt chip callbacks and handle power management in them as they are invoked from non-atomic context. [ tglx: Rewrote change log, added Fixes tag ]
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

03 Nov 2025, 22:17

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html -
  • () https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html -

02 Oct 2025, 18:34

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/21bd3f9e7f924cd2fc892a484e7a50c7e1847565 - () https://git.kernel.org/stable/c/21bd3f9e7f924cd2fc892a484e7a50c7e1847565 - Patch
References () https://git.kernel.org/stable/c/33b1c47d1fc0b5f06a393bb915db85baacba18ea - () https://git.kernel.org/stable/c/33b1c47d1fc0b5f06a393bb915db85baacba18ea - Patch
References () https://git.kernel.org/stable/c/3a2884a44e5cda192df1b28e9925661f79f599a1 - () https://git.kernel.org/stable/c/3a2884a44e5cda192df1b28e9925661f79f599a1 - Patch
References () https://git.kernel.org/stable/c/58c56735facb225a5c46fa4b8bbbe7f31d1cb894 - () https://git.kernel.org/stable/c/58c56735facb225a5c46fa4b8bbbe7f31d1cb894 - Patch
References () https://git.kernel.org/stable/c/a590e8dea3df2639921f874d763be961dd74e8f9 - () https://git.kernel.org/stable/c/a590e8dea3df2639921f874d763be961dd74e8f9 - Patch
References () https://git.kernel.org/stable/c/f8ae38f1dfe652779c7c613facbc257cec00ac44 - () https://git.kernel.org/stable/c/f8ae38f1dfe652779c7c613facbc257cec00ac44 - Patch
References () https://git.kernel.org/stable/c/fa1803401e1c360efe6342fb41d161cc51748a11 - () https://git.kernel.org/stable/c/fa1803401e1c360efe6342fb41d161cc51748a11 - Patch
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Information

Published : 2024-08-17 09:15

Updated : 2025-11-03 22:17


NVD link : CVE-2024-42290

Mitre link : CVE-2024-42290

CVE.ORG link : CVE-2024-42290


JSON object : View

Products Affected

linux

  • linux_kernel