In the Linux kernel, the following vulnerability has been resolved:
iommu/mediatek: Remove clkdisable in mtkiommu_remove
After the commit b34ea31fe013 ("iommu/mediatek: Always enable the clk on resume"), the iommu clock is controlled by the runtime callback. thus remove the clk control in the mtkiommuremove.
Otherwise, it will warning like:
echo 14018000.iommu > /sys/bus/platform/drivers/mtk-iommu/unbind
[ 51.413044] ------------[ cut here ]------------ [ 51.413648] vpp0smiiommu already disabled [ 51.414233] WARNING: CPU: 2 PID: 157 at */v5.15-rc1/kernel/mediatek/ drivers/clk/clk.c:952 clkcoredisable+0xb0/0xb8 [ 51.417174] Hardware name: MT8195V/C(ENG) (DT) [ 51.418635] pc : clkcoredisable+0xb0/0xb8 [ 51.419177] lr : clkcoredisable+0xb0/0xb8 ... [ 51.429375] Call trace: [ 51.429694] clkcoredisable+0xb0/0xb8 [ 51.430193] clkcoredisablelock+0x24/0x40 [ 51.430745] clkdisable+0x20/0x30 [ 51.431189] mtkiommuremove+0x58/0x118 [ 51.431705] platformremove+0x28/0x60 [ 51.432197] devicereleasedriverinternal+0x110/0x1f0 [ 51.432873] devicedriverdetach+0x18/0x28 [ 51.433418] unbindstore+0xd4/0x108 [ 51.433886] drvattrstore+0x24/0x38 [ 51.434363] sysfskfwrite+0x40/0x58 [ 51.434843] kernfsfopwriteiter+0x164/0x1e0
[
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@98df772bdd1c4ce717a26289efea15cbbe4b64ed",
"id": "CVE-2022-49427-0ea23da1",
"signature_version": "v1",
"target": {
"file": "drivers/iommu/mtk_iommu.c"
},
"signature_type": "Line",
"digest": {
"line_hashes": [
"285215936225340505424759661096438473923",
"329543206855789352744282942263744745686",
"19384619704024901837516417422391490775",
"161463807993469942074019891913622391659"
],
"threshold": 0.9
}
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9b3bd97acb4f8954b8a43a5d63ed9050d463b4e1",
"id": "CVE-2022-49427-388587d5",
"signature_version": "v1",
"target": {
"function": "mtk_iommu_remove",
"file": "drivers/iommu/mtk_iommu.c"
},
"signature_type": "Function",
"digest": {
"function_hash": "168364476132158021559688916648740533422",
"length": 387.0
}
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6eaa046c696c83542c56765cdde564d9818ff1fb",
"id": "CVE-2022-49427-3bfd66b5",
"signature_version": "v1",
"target": {
"function": "mtk_iommu_remove",
"file": "drivers/iommu/mtk_iommu.c"
},
"signature_type": "Function",
"digest": {
"function_hash": "168364476132158021559688916648740533422",
"length": 387.0
}
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@6eaa046c696c83542c56765cdde564d9818ff1fb",
"id": "CVE-2022-49427-48e2cedc",
"signature_version": "v1",
"target": {
"file": "drivers/iommu/mtk_iommu.c"
},
"signature_type": "Line",
"digest": {
"line_hashes": [
"285215936225340505424759661096438473923",
"329543206855789352744282942263744745686",
"19384619704024901837516417422391490775",
"161463807993469942074019891913622391659"
],
"threshold": 0.9
}
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@9b3bd97acb4f8954b8a43a5d63ed9050d463b4e1",
"id": "CVE-2022-49427-4a9af73c",
"signature_version": "v1",
"target": {
"file": "drivers/iommu/mtk_iommu.c"
},
"signature_type": "Line",
"digest": {
"line_hashes": [
"285215936225340505424759661096438473923",
"329543206855789352744282942263744745686",
"19384619704024901837516417422391490775",
"161463807993469942074019891913622391659"
],
"threshold": 0.9
}
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@053465ab20dcd324a43a1811ee98e5721e6a3e65",
"id": "CVE-2022-49427-70c4d4b4",
"signature_version": "v1",
"target": {
"function": "mtk_iommu_remove",
"file": "drivers/iommu/mtk_iommu.c"
},
"signature_type": "Function",
"digest": {
"function_hash": "168364476132158021559688916648740533422",
"length": 387.0
}
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@98df772bdd1c4ce717a26289efea15cbbe4b64ed",
"id": "CVE-2022-49427-c0bb7410",
"signature_version": "v1",
"target": {
"function": "mtk_iommu_remove",
"file": "drivers/iommu/mtk_iommu.c"
},
"signature_type": "Function",
"digest": {
"function_hash": "168364476132158021559688916648740533422",
"length": 387.0
}
},
{
"deprecated": false,
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@053465ab20dcd324a43a1811ee98e5721e6a3e65",
"id": "CVE-2022-49427-f24946f2",
"signature_version": "v1",
"target": {
"file": "drivers/iommu/mtk_iommu.c"
},
"signature_type": "Line",
"digest": {
"line_hashes": [
"285215936225340505424759661096438473923",
"329543206855789352744282942263744745686",
"19384619704024901837516417422391490775",
"161463807993469942074019891913622391659"
],
"threshold": 0.9
}
}
]