| From bippy-5f407fcff5a0 Mon Sep 17 00:00:00 2001 |
| From: Greg Kroah-Hartman <gregkh@linuxfoundation.org> |
| To: <linux-cve-announce@vger.kernel.org> |
| Reply-to: <cve@kernel.org>, <linux-kernel@vger.kernel.org> |
| Subject: CVE-2024-36926: powerpc/pseries/iommu: LPAR panics during boot up with a frozen PE |
| |
| Description |
| =========== |
| |
| In the Linux kernel, the following vulnerability has been resolved: |
| |
| powerpc/pseries/iommu: LPAR panics during boot up with a frozen PE |
| |
| At the time of LPAR boot up, partition firmware provides Open Firmware |
| property ibm,dma-window for the PE. This property is provided on the PCI |
| bus the PE is attached to. |
| |
| There are execptions where the partition firmware might not provide this |
| property for the PE at the time of LPAR boot up. One of the scenario is |
| where the firmware has frozen the PE due to some error condition. This |
| PE is frozen for 24 hours or unless the whole system is reinitialized. |
| |
| Within this time frame, if the LPAR is booted, the frozen PE will be |
| presented to the LPAR but ibm,dma-window property could be missing. |
| |
| Today, under these circumstances, the LPAR oopses with NULL pointer |
| dereference, when configuring the PCI bus the PE is attached to. |
| |
| BUG: Kernel NULL pointer dereference on read at 0x000000c8 |
| Faulting instruction address: 0xc0000000001024c0 |
| Oops: Kernel access of bad area, sig: 7 [#1] |
| LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries |
| Modules linked in: |
| Supported: Yes |
| CPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.4.0-150600.9-default #1 |
| Hardware name: IBM,9043-MRX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NM1060_023) hv:phyp pSeries |
| NIP: c0000000001024c0 LR: c0000000001024b0 CTR: c000000000102450 |
| REGS: c0000000037db5c0 TRAP: 0300 Not tainted (6.4.0-150600.9-default) |
| MSR: 8000000002009033 <SF,VEC,EE,ME,IR,DR,RI,LE> CR: 28000822 XER: 00000000 |
| CFAR: c00000000010254c DAR: 00000000000000c8 DSISR: 00080000 IRQMASK: 0 |
| ... |
| NIP [c0000000001024c0] pci_dma_bus_setup_pSeriesLP+0x70/0x2a0 |
| LR [c0000000001024b0] pci_dma_bus_setup_pSeriesLP+0x60/0x2a0 |
| Call Trace: |
| pci_dma_bus_setup_pSeriesLP+0x60/0x2a0 (unreliable) |
| pcibios_setup_bus_self+0x1c0/0x370 |
| __of_scan_bus+0x2f8/0x330 |
| pcibios_scan_phb+0x280/0x3d0 |
| pcibios_init+0x88/0x12c |
| do_one_initcall+0x60/0x320 |
| kernel_init_freeable+0x344/0x3e4 |
| kernel_init+0x34/0x1d0 |
| ret_from_kernel_user_thread+0x14/0x1c |
| |
| The Linux kernel CVE team has assigned CVE-2024-36926 to this issue. |
| |
| |
| Affected and fixed versions |
| =========================== |
| |
| Issue introduced in 6.0 with commit b1fc44eaa9ba31e28c4125d6b9205a3582b47b5d and fixed in 6.1.91 with commit 7fb5793c53f8c024e3eae9f0d44eb659aed833c4 |
| Issue introduced in 6.0 with commit b1fc44eaa9ba31e28c4125d6b9205a3582b47b5d and fixed in 6.6.31 with commit 802b13b79ab1fef66c6852fc745cf197dca0cb15 |
| Issue introduced in 6.0 with commit b1fc44eaa9ba31e28c4125d6b9205a3582b47b5d and fixed in 6.8.10 with commit 2bed905a72485a2b79a001bd7e66c750942d2155 |
| Issue introduced in 6.0 with commit b1fc44eaa9ba31e28c4125d6b9205a3582b47b5d and fixed in 6.9 with commit 49a940dbdc3107fecd5e6d3063dc07128177e058 |
| Issue introduced in 5.18.18 with commit b9f08b2649dddd4eb0698cb428b173bb01dd2fc5 |
| Issue introduced in 5.19.2 with commit 58942f672c6d04b6a3cd7866cb459671df881538 |
| |
| Please see https://www.kernel.org for a full list of currently supported |
| kernel versions by the kernel community. |
| |
| Unaffected versions might change over time as fixes are backported to |
| older supported kernel versions. The official CVE entry at |
| https://cve.org/CVERecord/?id=CVE-2024-36926 |
| will be updated if fixes are backported, please check that for the most |
| up to date information about this issue. |
| |
| |
| Affected files |
| ============== |
| |
| The file(s) affected by this issue are: |
| arch/powerpc/platforms/pseries/iommu.c |
| |
| |
| Mitigation |
| ========== |
| |
| The Linux kernel CVE team recommends that you update to the latest |
| stable kernel version for this, and many other bugfixes. Individual |
| changes are never tested alone, but rather are part of a larger kernel |
| release. Cherry-picking individual commits is not recommended or |
| supported by the Linux kernel community at all. If however, updating to |
| the latest release is impossible, the individual changes to resolve this |
| issue can be found at these commits: |
| https://git.kernel.org/stable/c/7fb5793c53f8c024e3eae9f0d44eb659aed833c4 |
| https://git.kernel.org/stable/c/802b13b79ab1fef66c6852fc745cf197dca0cb15 |
| https://git.kernel.org/stable/c/2bed905a72485a2b79a001bd7e66c750942d2155 |
| https://git.kernel.org/stable/c/49a940dbdc3107fecd5e6d3063dc07128177e058 |