OESA-2025-2409

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-2409
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2025-2409.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2025-2409
Upstream
Published
2025-10-11T13:21:16Z
Modified
2025-10-11T14:02:41.176055Z
Summary
kernel security update
Details

The Linux Kernel, the operating system core itself.

Security Fix(es):

In the Linux kernel, the following vulnerability has been resolved:

pinctrl: mcp23s08: Fix sleeping in atomic context due to regmap locking

If a device uses MCP23xxx IO expander to receive IRQs, the following bug can happen:

BUG: sleeping function called from invalid context at kernel/locking/mutex.c:283 inatomic(): 1, irqsdisabled(): 1, nonblock: 0, ... preemptcount: 1, expected: 0 ... Call Trace: ... _mightresched+0x104/0x10e _mightsleep+0x3e/0x62 mutexlock+0x20/0x4c regmaplockmutex+0x10/0x18 regmapupdatebitsbase+0x2c/0x66 mcp23s08irqsettype+0x1ae/0x1d6 _irqsettrigger+0x56/0x172 _setupirq+0x1e6/0x646 requestthreadedirq+0xb6/0x160 ...

We observed the problem while experimenting with a touchscreen driver which used MCP23017 IO expander (I2C).

The regmap in the pinctrl-mcp23s08 driver uses a mutex for protection from concurrent accesses, which is the default for regmaps without .fastio, .disablelocking, etc.

mcp23s08irqsettype() calls regmapupdatebitsbase(), and the latter locks the mutex.

However, _setupirq() locks desc->lock spinlock before calling these functions. As a result, the system tries to lock the mutex whole holding the spinlock.

It seems, the internal regmap locks are not needed in this driver at all. mcp->lock seems to protect the regmap from concurrent accesses already, except, probably, in mcppinconfget/set.

mcp23s08irqsettype() and mcp23s08irqmask/unmask() are called under chipbuslock(), which calls mcp23s08irqbuslock(). The latter takes mcp->lock and enables regmap caching, so that the potentially slow I2C accesses are deferred until chipbusunlock().

The accesses to the regmap from mcp23s08probeone() do not need additional locking.

In all remaining places where the regmap is accessed, except mcppinconfget/set(), the driver already takes mcp->lock.

This patch adds locking in mcppinconfget/set() and disables internal locking in the regmap config. Among other things, it fixes the sleeping in atomic context described above.(CVE-2024-57889)

In the Linux kernel, the following vulnerability has been resolved:

mm/smaps: fix race between smapshugetlbrange and migration

smapshugetlbrange() handles the pte without holdling ptl, and may be concurrenct with migration, leaing to BUGON in pfnswapentryto_page(). The race is as follows.

smapshugetlbrange migratepages hugeptepget removemigrationptes foliounlock pfnswapentryfolio BUGON

To fix it, hold ptl lock in smapshugetlbrange().(CVE-2025-39754)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:24.03-LTS / kernel

Package

Name
kernel
Purl
pkg:rpm/openEuler/kernel&distro=openEuler-24.03-LTS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.6.0-111.0.0.103.oe2403

Ecosystem specific

{
    "src": [
        "kernel-6.6.0-111.0.0.103.oe2403.src.rpm"
    ],
    "aarch64": [
        "bpftool-6.6.0-111.0.0.103.oe2403.aarch64.rpm",
        "bpftool-debuginfo-6.6.0-111.0.0.103.oe2403.aarch64.rpm",
        "kernel-6.6.0-111.0.0.103.oe2403.aarch64.rpm",
        "kernel-debuginfo-6.6.0-111.0.0.103.oe2403.aarch64.rpm",
        "kernel-debugsource-6.6.0-111.0.0.103.oe2403.aarch64.rpm",
        "kernel-devel-6.6.0-111.0.0.103.oe2403.aarch64.rpm",
        "kernel-headers-6.6.0-111.0.0.103.oe2403.aarch64.rpm",
        "kernel-source-6.6.0-111.0.0.103.oe2403.aarch64.rpm",
        "kernel-tools-6.6.0-111.0.0.103.oe2403.aarch64.rpm",
        "kernel-tools-debuginfo-6.6.0-111.0.0.103.oe2403.aarch64.rpm",
        "kernel-tools-devel-6.6.0-111.0.0.103.oe2403.aarch64.rpm",
        "perf-6.6.0-111.0.0.103.oe2403.aarch64.rpm",
        "perf-debuginfo-6.6.0-111.0.0.103.oe2403.aarch64.rpm",
        "python3-perf-6.6.0-111.0.0.103.oe2403.aarch64.rpm",
        "python3-perf-debuginfo-6.6.0-111.0.0.103.oe2403.aarch64.rpm"
    ],
    "x86_64": [
        "bpftool-6.6.0-111.0.0.103.oe2403.x86_64.rpm",
        "bpftool-debuginfo-6.6.0-111.0.0.103.oe2403.x86_64.rpm",
        "kernel-6.6.0-111.0.0.103.oe2403.x86_64.rpm",
        "kernel-debuginfo-6.6.0-111.0.0.103.oe2403.x86_64.rpm",
        "kernel-debugsource-6.6.0-111.0.0.103.oe2403.x86_64.rpm",
        "kernel-devel-6.6.0-111.0.0.103.oe2403.x86_64.rpm",
        "kernel-headers-6.6.0-111.0.0.103.oe2403.x86_64.rpm",
        "kernel-source-6.6.0-111.0.0.103.oe2403.x86_64.rpm",
        "kernel-tools-6.6.0-111.0.0.103.oe2403.x86_64.rpm",
        "kernel-tools-debuginfo-6.6.0-111.0.0.103.oe2403.x86_64.rpm",
        "kernel-tools-devel-6.6.0-111.0.0.103.oe2403.x86_64.rpm",
        "perf-6.6.0-111.0.0.103.oe2403.x86_64.rpm",
        "perf-debuginfo-6.6.0-111.0.0.103.oe2403.x86_64.rpm",
        "python3-perf-6.6.0-111.0.0.103.oe2403.x86_64.rpm",
        "python3-perf-debuginfo-6.6.0-111.0.0.103.oe2403.x86_64.rpm"
    ]
}