CVE-2022-50214 (GCVE-0-2022-50214)
Vulnerability from cvelistv5
Published
2025-06-18 11:03
Modified
2025-06-18 11:03
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: coresight: Clear the connection field properly coresight devices track their connections (output connections) and hold a reference to the fwnode. When a device goes away, we walk through the devices on the coresight bus and make sure that the references are dropped. This happens both ways: a) For all output connections from the device, drop the reference to the target device via coresight_release_platform_data() b) Iterate over all the devices on the coresight bus and drop the reference to fwnode if *this* device is the target of the output connection, via coresight_remove_conns()->coresight_remove_match(). However, the coresight_remove_match() doesn't clear the fwnode field, after dropping the reference, this causes use-after-free and additional refcount drops on the fwnode. e.g., if we have two devices, A and B, with a connection, A -> B. If we remove B first, B would clear the reference on B, from A via coresight_remove_match(). But when A is removed, it still has a connection with fwnode still pointing to B. Thus it tries to drops the reference in coresight_release_platform_data(), raising the bells like : [ 91.990153] ------------[ cut here ]------------ [ 91.990163] refcount_t: addition on 0; use-after-free. [ 91.990212] WARNING: CPU: 0 PID: 461 at lib/refcount.c:25 refcount_warn_saturate+0xa0/0x144 [ 91.990260] Modules linked in: coresight_funnel coresight_replicator coresight_etm4x(-) crct10dif_ce coresight ip_tables x_tables ipv6 [last unloaded: coresight_cpu_debug] [ 91.990398] CPU: 0 PID: 461 Comm: rmmod Tainted: G W T 5.19.0-rc2+ #53 [ 91.990418] Hardware name: ARM LTD ARM Juno Development Platform/ARM Juno Development Platform, BIOS EDK II Feb 1 2019 [ 91.990434] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 91.990454] pc : refcount_warn_saturate+0xa0/0x144 [ 91.990476] lr : refcount_warn_saturate+0xa0/0x144 [ 91.990496] sp : ffff80000c843640 [ 91.990509] x29: ffff80000c843640 x28: ffff800009957c28 x27: ffff80000c8439a8 [ 91.990560] x26: ffff00097eff1990 x25: ffff8000092b6ad8 x24: ffff00097eff19a8 [ 91.990610] x23: ffff80000c8439a8 x22: 0000000000000000 x21: ffff80000c8439c2 [ 91.990659] x20: 0000000000000000 x19: ffff00097eff1a10 x18: ffff80000ab99c40 [ 91.990708] x17: 0000000000000000 x16: 0000000000000000 x15: ffff80000abf6fa0 [ 91.990756] x14: 000000000000001d x13: 0a2e656572662d72 x12: 657466612d657375 [ 91.990805] x11: 203b30206e6f206e x10: 6f69746964646120 x9 : ffff8000081aba28 [ 91.990854] x8 : 206e6f206e6f6974 x7 : 69646461203a745f x6 : 746e756f63666572 [ 91.990903] x5 : ffff00097648ec58 x4 : 0000000000000000 x3 : 0000000000000027 [ 91.990952] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff00080260ba00 [ 91.991000] Call trace: [ 91.991012] refcount_warn_saturate+0xa0/0x144 [ 91.991034] kobject_get+0xac/0xb0 [ 91.991055] of_node_get+0x2c/0x40 [ 91.991076] of_fwnode_get+0x40/0x60 [ 91.991094] fwnode_handle_get+0x3c/0x60 [ 91.991116] fwnode_get_nth_parent+0xf4/0x110 [ 91.991137] fwnode_full_name_string+0x48/0xc0 [ 91.991158] device_node_string+0x41c/0x530 [ 91.991178] pointer+0x320/0x3ec [ 91.991198] vsnprintf+0x23c/0x750 [ 91.991217] vprintk_store+0x104/0x4b0 [ 91.991238] vprintk_emit+0x8c/0x360 [ 91.991257] vprintk_default+0x44/0x50 [ 91.991276] vprintk+0xcc/0xf0 [ 91.991295] _printk+0x68/0x90 [ 91.991315] of_node_release+0x13c/0x14c [ 91.991334] kobject_put+0x98/0x114 [ 91.991354] of_node_put+0x24/0x34 [ 91.991372] of_fwnode_put+0x40/0x5c [ 91.991390] fwnode_handle_put+0x38/0x50 [ 91.991411] coresight_release_platform_data+0x74/0xb0 [coresight] [ 91.991472] coresight_unregister+0x64/0xcc [coresight] [ 91.991525] etm4_remove_dev+0x64/0x78 [coresight_etm4x] [ 91.991563] etm4_remove_amba+0x1c/0x2c [coresight_etm4x] [ 91.991598] amba_remove+0x3c/0x19c ---truncated---
Impacted products
Vendor Product Version
Linux Linux Version: 37ea1ffddffa63c920ce826786fe610c78f57842
Version: 37ea1ffddffa63c920ce826786fe610c78f57842
Version: 37ea1ffddffa63c920ce826786fe610c78f57842
Version: 37ea1ffddffa63c920ce826786fe610c78f57842
Version: 37ea1ffddffa63c920ce826786fe610c78f57842
Version: 37ea1ffddffa63c920ce826786fe610c78f57842
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/hwtracing/coresight/coresight-core.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "e9205d8dd1cafb7cff689ef9ddf06276a68f54a4",
              "status": "affected",
              "version": "37ea1ffddffa63c920ce826786fe610c78f57842",
              "versionType": "git"
            },
            {
              "lessThan": "847b9273dd61567fb77617eabc5fa002594db062",
              "status": "affected",
              "version": "37ea1ffddffa63c920ce826786fe610c78f57842",
              "versionType": "git"
            },
            {
              "lessThan": "b49b29ee113a87997bcca0bb0585bb46582846c1",
              "status": "affected",
              "version": "37ea1ffddffa63c920ce826786fe610c78f57842",
              "versionType": "git"
            },
            {
              "lessThan": "d43e967963c4d1b2b49f894d2f1b12865f87b098",
              "status": "affected",
              "version": "37ea1ffddffa63c920ce826786fe610c78f57842",
              "versionType": "git"
            },
            {
              "lessThan": "bc57850fcb7e4cb91b6321d0ce83357cefd55c54",
              "status": "affected",
              "version": "37ea1ffddffa63c920ce826786fe610c78f57842",
              "versionType": "git"
            },
            {
              "lessThan": "2af89ebacf299b7fba5f3087d35e8a286ec33706",
              "status": "affected",
              "version": "37ea1ffddffa63c920ce826786fe610c78f57842",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/hwtracing/coresight/coresight-core.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.3"
            },
            {
              "lessThan": "5.3",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "unaffected",
              "version": "5.4.211",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.10.*",
              "status": "unaffected",
              "version": "5.10.137",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.15.*",
              "status": "unaffected",
              "version": "5.15.61",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.18.*",
              "status": "unaffected",
              "version": "5.18.18",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "5.19.*",
              "status": "unaffected",
              "version": "5.19.2",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.0",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.4.211",
                  "versionStartIncluding": "5.3",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.10.137",
                  "versionStartIncluding": "5.3",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.15.61",
                  "versionStartIncluding": "5.3",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.18.18",
                  "versionStartIncluding": "5.3",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "5.19.2",
                  "versionStartIncluding": "5.3",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.0",
                  "versionStartIncluding": "5.3",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: Clear the connection field properly\n\ncoresight devices track their connections (output connections) and\nhold a reference to the fwnode. When a device goes away, we walk through\nthe devices on the coresight bus and make sure that the references\nare dropped. This happens both ways:\n a) For all output connections from the device, drop the reference to\n    the target device via coresight_release_platform_data()\n\nb) Iterate over all the devices on the coresight bus and drop the\n   reference to fwnode if *this* device is the target of the output\n   connection, via coresight_remove_conns()-\u003ecoresight_remove_match().\n\nHowever, the coresight_remove_match() doesn\u0027t clear the fwnode field,\nafter dropping the reference, this causes use-after-free and\nadditional refcount drops on the fwnode.\n\ne.g., if we have two devices, A and B, with a connection, A -\u003e B.\nIf we remove B first, B would clear the reference on B, from A\nvia coresight_remove_match(). But when A is removed, it still has\na connection with fwnode still pointing to B. Thus it tries to  drops\nthe reference in coresight_release_platform_data(), raising the bells\nlike :\n\n[   91.990153] ------------[ cut here ]------------\n[   91.990163] refcount_t: addition on 0; use-after-free.\n[   91.990212] WARNING: CPU: 0 PID: 461 at lib/refcount.c:25 refcount_warn_saturate+0xa0/0x144\n[   91.990260] Modules linked in: coresight_funnel coresight_replicator coresight_etm4x(-)\n crct10dif_ce coresight ip_tables x_tables ipv6 [last unloaded: coresight_cpu_debug]\n[   91.990398] CPU: 0 PID: 461 Comm: rmmod Tainted: G        W       T 5.19.0-rc2+ #53\n[   91.990418] Hardware name: ARM LTD ARM Juno Development Platform/ARM Juno Development Platform, BIOS EDK II Feb  1 2019\n[   91.990434] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[   91.990454] pc : refcount_warn_saturate+0xa0/0x144\n[   91.990476] lr : refcount_warn_saturate+0xa0/0x144\n[   91.990496] sp : ffff80000c843640\n[   91.990509] x29: ffff80000c843640 x28: ffff800009957c28 x27: ffff80000c8439a8\n[   91.990560] x26: ffff00097eff1990 x25: ffff8000092b6ad8 x24: ffff00097eff19a8\n[   91.990610] x23: ffff80000c8439a8 x22: 0000000000000000 x21: ffff80000c8439c2\n[   91.990659] x20: 0000000000000000 x19: ffff00097eff1a10 x18: ffff80000ab99c40\n[   91.990708] x17: 0000000000000000 x16: 0000000000000000 x15: ffff80000abf6fa0\n[   91.990756] x14: 000000000000001d x13: 0a2e656572662d72 x12: 657466612d657375\n[   91.990805] x11: 203b30206e6f206e x10: 6f69746964646120 x9 : ffff8000081aba28\n[   91.990854] x8 : 206e6f206e6f6974 x7 : 69646461203a745f x6 : 746e756f63666572\n[   91.990903] x5 : ffff00097648ec58 x4 : 0000000000000000 x3 : 0000000000000027\n[   91.990952] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff00080260ba00\n[   91.991000] Call trace:\n[   91.991012]  refcount_warn_saturate+0xa0/0x144\n[   91.991034]  kobject_get+0xac/0xb0\n[   91.991055]  of_node_get+0x2c/0x40\n[   91.991076]  of_fwnode_get+0x40/0x60\n[   91.991094]  fwnode_handle_get+0x3c/0x60\n[   91.991116]  fwnode_get_nth_parent+0xf4/0x110\n[   91.991137]  fwnode_full_name_string+0x48/0xc0\n[   91.991158]  device_node_string+0x41c/0x530\n[   91.991178]  pointer+0x320/0x3ec\n[   91.991198]  vsnprintf+0x23c/0x750\n[   91.991217]  vprintk_store+0x104/0x4b0\n[   91.991238]  vprintk_emit+0x8c/0x360\n[   91.991257]  vprintk_default+0x44/0x50\n[   91.991276]  vprintk+0xcc/0xf0\n[   91.991295]  _printk+0x68/0x90\n[   91.991315]  of_node_release+0x13c/0x14c\n[   91.991334]  kobject_put+0x98/0x114\n[   91.991354]  of_node_put+0x24/0x34\n[   91.991372]  of_fwnode_put+0x40/0x5c\n[   91.991390]  fwnode_handle_put+0x38/0x50\n[   91.991411]  coresight_release_platform_data+0x74/0xb0 [coresight]\n[   91.991472]  coresight_unregister+0x64/0xcc [coresight]\n[   91.991525]  etm4_remove_dev+0x64/0x78 [coresight_etm4x]\n[   91.991563]  etm4_remove_amba+0x1c/0x2c [coresight_etm4x]\n[   91.991598]  amba_remove+0x3c/0x19c\n---truncated---"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-18T11:03:51.561Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/e9205d8dd1cafb7cff689ef9ddf06276a68f54a4"
        },
        {
          "url": "https://git.kernel.org/stable/c/847b9273dd61567fb77617eabc5fa002594db062"
        },
        {
          "url": "https://git.kernel.org/stable/c/b49b29ee113a87997bcca0bb0585bb46582846c1"
        },
        {
          "url": "https://git.kernel.org/stable/c/d43e967963c4d1b2b49f894d2f1b12865f87b098"
        },
        {
          "url": "https://git.kernel.org/stable/c/bc57850fcb7e4cb91b6321d0ce83357cefd55c54"
        },
        {
          "url": "https://git.kernel.org/stable/c/2af89ebacf299b7fba5f3087d35e8a286ec33706"
        }
      ],
      "title": "coresight: Clear the connection field properly",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2022-50214",
    "datePublished": "2025-06-18T11:03:51.561Z",
    "dateReserved": "2025-06-18T10:57:27.429Z",
    "dateUpdated": "2025-06-18T11:03:51.561Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-50214\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-06-18T11:15:52.310\",\"lastModified\":\"2025-06-18T13:47:40.833\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ncoresight: Clear the connection field properly\\n\\ncoresight devices track their connections (output connections) and\\nhold a reference to the fwnode. When a device goes away, we walk through\\nthe devices on the coresight bus and make sure that the references\\nare dropped. This happens both ways:\\n a) For all output connections from the device, drop the reference to\\n    the target device via coresight_release_platform_data()\\n\\nb) Iterate over all the devices on the coresight bus and drop the\\n   reference to fwnode if *this* device is the target of the output\\n   connection, via coresight_remove_conns()-\u003ecoresight_remove_match().\\n\\nHowever, the coresight_remove_match() doesn\u0027t clear the fwnode field,\\nafter dropping the reference, this causes use-after-free and\\nadditional refcount drops on the fwnode.\\n\\ne.g., if we have two devices, A and B, with a connection, A -\u003e B.\\nIf we remove B first, B would clear the reference on B, from A\\nvia coresight_remove_match(). But when A is removed, it still has\\na connection with fwnode still pointing to B. Thus it tries to  drops\\nthe reference in coresight_release_platform_data(), raising the bells\\nlike :\\n\\n[   91.990153] ------------[ cut here ]------------\\n[   91.990163] refcount_t: addition on 0; use-after-free.\\n[   91.990212] WARNING: CPU: 0 PID: 461 at lib/refcount.c:25 refcount_warn_saturate+0xa0/0x144\\n[   91.990260] Modules linked in: coresight_funnel coresight_replicator coresight_etm4x(-)\\n crct10dif_ce coresight ip_tables x_tables ipv6 [last unloaded: coresight_cpu_debug]\\n[   91.990398] CPU: 0 PID: 461 Comm: rmmod Tainted: G        W       T 5.19.0-rc2+ #53\\n[   91.990418] Hardware name: ARM LTD ARM Juno Development Platform/ARM Juno Development Platform, BIOS EDK II Feb  1 2019\\n[   91.990434] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\\n[   91.990454] pc : refcount_warn_saturate+0xa0/0x144\\n[   91.990476] lr : refcount_warn_saturate+0xa0/0x144\\n[   91.990496] sp : ffff80000c843640\\n[   91.990509] x29: ffff80000c843640 x28: ffff800009957c28 x27: ffff80000c8439a8\\n[   91.990560] x26: ffff00097eff1990 x25: ffff8000092b6ad8 x24: ffff00097eff19a8\\n[   91.990610] x23: ffff80000c8439a8 x22: 0000000000000000 x21: ffff80000c8439c2\\n[   91.990659] x20: 0000000000000000 x19: ffff00097eff1a10 x18: ffff80000ab99c40\\n[   91.990708] x17: 0000000000000000 x16: 0000000000000000 x15: ffff80000abf6fa0\\n[   91.990756] x14: 000000000000001d x13: 0a2e656572662d72 x12: 657466612d657375\\n[   91.990805] x11: 203b30206e6f206e x10: 6f69746964646120 x9 : ffff8000081aba28\\n[   91.990854] x8 : 206e6f206e6f6974 x7 : 69646461203a745f x6 : 746e756f63666572\\n[   91.990903] x5 : ffff00097648ec58 x4 : 0000000000000000 x3 : 0000000000000027\\n[   91.990952] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff00080260ba00\\n[   91.991000] Call trace:\\n[   91.991012]  refcount_warn_saturate+0xa0/0x144\\n[   91.991034]  kobject_get+0xac/0xb0\\n[   91.991055]  of_node_get+0x2c/0x40\\n[   91.991076]  of_fwnode_get+0x40/0x60\\n[   91.991094]  fwnode_handle_get+0x3c/0x60\\n[   91.991116]  fwnode_get_nth_parent+0xf4/0x110\\n[   91.991137]  fwnode_full_name_string+0x48/0xc0\\n[   91.991158]  device_node_string+0x41c/0x530\\n[   91.991178]  pointer+0x320/0x3ec\\n[   91.991198]  vsnprintf+0x23c/0x750\\n[   91.991217]  vprintk_store+0x104/0x4b0\\n[   91.991238]  vprintk_emit+0x8c/0x360\\n[   91.991257]  vprintk_default+0x44/0x50\\n[   91.991276]  vprintk+0xcc/0xf0\\n[   91.991295]  _printk+0x68/0x90\\n[   91.991315]  of_node_release+0x13c/0x14c\\n[   91.991334]  kobject_put+0x98/0x114\\n[   91.991354]  of_node_put+0x24/0x34\\n[   91.991372]  of_fwnode_put+0x40/0x5c\\n[   91.991390]  fwnode_handle_put+0x38/0x50\\n[   91.991411]  coresight_release_platform_data+0x74/0xb0 [coresight]\\n[   91.991472]  coresight_unregister+0x64/0xcc [coresight]\\n[   91.991525]  etm4_remove_dev+0x64/0x78 [coresight_etm4x]\\n[   91.991563]  etm4_remove_amba+0x1c/0x2c [coresight_etm4x]\\n[   91.991598]  amba_remove+0x3c/0x19c\\n---truncated---\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: coresight: Borrar el campo de conexi\u00f3n correctamente los dispositivos coresight rastrean sus conexiones (conexiones de salida) y mantienen una referencia al fwnode. Cuando un dispositivo desaparece, recorremos los dispositivos en el bus coresight y nos aseguramos de que se eliminen las referencias. Esto sucede en ambos sentidos: a) Para todas las conexiones de salida desde el dispositivo, eliminamos la referencia al dispositivo de destino mediante coresight_release_platform_data() b) Iteramos sobre todos los dispositivos en el bus coresight y eliminamos la referencia a fwnode si *este* dispositivo es el destino de la conexi\u00f3n de salida, mediante coresight_remove_conns()-\u0026gt;coresight_remove_match(). Sin embargo, coresight_remove_match() no borra el campo fwnode, despu\u00e9s de eliminar la referencia, esto causa Use-After-Free y disminuciones adicionales de refcount en el fwnode. Por ejemplo, si tenemos dos dispositivos, A y B, conectados, A -\u0026gt; B. Si eliminamos B primero, B eliminar\u00eda la referencia en B desde A mediante coresight_remove_match(). Sin embargo, al eliminar A, a\u00fan mantiene una conexi\u00f3n con fwnode apuntando a B. Por lo tanto, intenta eliminar la referencia en coresight_release_platform_data(), lo que genera alertas como: [ 91.990153 ------------[ cortar aqu\u00ed ]------------ [ 91.990163 ] refcount_t: adici\u00f3n en 0; Use-After-Free. [ 91.990212] ADVERTENCIA: CPU: 0 PID: 461 en lib/refcount.c:25 refcount_warn_saturate+0xa0/0x144 [ 91.990260] M\u00f3dulos vinculados: coresight_funnel coresight_replicator coresight_etm4x(-) crct10dif_ce coresight ip_tables x_tables ipv6 [\u00faltima descarga: coresight_cpu_debug] [ 91.990398] CPU: 0 PID: 461 Comm: rmmod Contaminado: GWT 5.19.0-rc2+ #53 [ 91.990418] Nombre del hardware: ARM LTD ARM Juno Development Platform/ARM Juno Development Platform, BIOS EDK II 1 de febrero de 2019 [ 91.990434] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 91.990454] pc : refcount_warn_saturate+0xa0/0x144 [ 91.990476] lr : refcount_warn_saturate+0xa0/0x144 [ 91.990496] sp : ffff80000c843640 [ 91.990509] x29: ffff80000c843640 x28: ffff800009957c28 x27: ffff80000c8439a8 [ 91.990560] x26: ffff00097eff1990 x25: ffff8000092b6ad8 x24: ffff00097eff19a8 [91.990610] x23: ffff80000c8439a8 x22: 0000000000000000 x21: ffff80000c8439c2 [91.990659] x20: 0000000000000000 x19: ffff00097eff1a10 x18: ffff80000ab99c40 [91.990708] x17: 000000000000000 x16: 0000000000000000 x15: ffff80000abf6fa0 [ 91.990756] x14: 000000000000001d x13: 0a2e656572662d72 x12: 657466612d657375 [ 91.990805] x11: 203b30206e6f206e x10: 6f69746964646120 x9: ffff8000081aba28 [91.990854] x8: 206e6f206e6f6974 x7: 69646461203a745f x6: 746e756f63666572 [91.990903] x5: ffff00097648ec58 x4: 0000000000000000 x3: 0000000000000027 [91.990952] x2: 0000000000000000 x1: 0000000000000000 x0: ffff00080260ba00 [91.991000] Rastreo de llamadas: [ 91.991012] refcount_warn_saturate+0xa0/0x144 [ 91.991034] kobject_get+0xac/0xb0 [ 91.991055] of_node_get+0x2c/0x40 [ 91.991076] of_fwnode_get+0x40/0x60 [ 91.991094] fwnode_handle_get+0x3c/0x60 [ 91.991116] fwnode_get_nth_parent+0xf4/0x110 [ 91.991137] fwnode_full_name_string+0x48/0xc0 [ 91.991158] device_node_string+0x41c/0x530 [ 91.991178] pointer+0x320/0x3ec [ 91.991198] vsnprintf+0x23c/0x750 [ 91.991217] vprintk_store+0x104/0x4b0 [ 91.991238] vprintk_emit+0x8c/0x360 [ 91.991257] vprintk_default+0x44/0x50 [ 91.991276] vprintk+0xcc/0xf0 [ 91.991295] _printk+0x68/0x90 [ 91.991315] of_node_release+0x13c/0x14c [ 91.991334] kobject_put+0x98/0x114 [ 91.991354] of_node_put+0x24/0x34 [ 91.991372] of_fwnode_put+0x40/0x5c [ 91.991390] fwnode_handle_put+0x38/0x50 [ 91.991411] coresight_release_platform_data+0x74/0xb0 [coresight] [ 91.991472] coresight_unregister+0x64/0xcc [coresight] [ 91.991525] etm4_remove_dev+0x64/0x78 [coresight_etm4x] [ 91.991563] etm4_remove_amba+0x1c/0x2c [coresight_etm4x] [ 91.991598] amba_remove+0x3c/0x19c ---truncado---\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/2af89ebacf299b7fba5f3087d35e8a286ec33706\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/847b9273dd61567fb77617eabc5fa002594db062\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b49b29ee113a87997bcca0bb0585bb46582846c1\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/bc57850fcb7e4cb91b6321d0ce83357cefd55c54\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/d43e967963c4d1b2b49f894d2f1b12865f87b098\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/e9205d8dd1cafb7cff689ef9ddf06276a68f54a4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…