In the Linux kernel, the following vulnerability has been resolved:
soc: xilinx: rename cpunumber1 to dummycpu_number
The per cpu variable cpunumber1 is passed to xlnxeventhandler as argument "devid", but it is not used in this function. So drop the initialization of this variable and rename it to dummycpunumber. This patch is to fix the following call trace when the kernel option CONFIGDEBUGATOMIC_SLEEP is enabled:
BUG: sleeping function called from invalid context at include/linux/sched/mm.h:274 inatomic(): 1, irqsdisabled(): 0, nonblock: 0, pid: 1, name: swapper/0 preemptcount: 1, expected: 0 CPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.1.0 #53 Hardware name: Xilinx Versal vmk180 Eval board rev1.1 (QSPI) (DT) Call trace: dumpbacktrace+0xd0/0xe0 showstack+0x18/0x40 dumpstacklvl+0x7c/0xa0 dump_stack+0x18/0x34 __might_resched+0x10c/0x140 __might_sleep+0x4c/0xa0 __kmemcacheallocnode+0xf4/0x168 kmalloctrace+0x28/0x38 __requestpercpuirq+0x74/0x138 xlnxeventmanagerprobe+0xf8/0x298 platformprobe+0x68/0xd8
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/43xxx/CVE-2024-43851.json",
"cna_assigner": "Linux"
}