In the Linux kernel, the following vulnerability has been resolved:
blk-iocost: do not WARN if iocg was already offlined
In iocg_pay_debt(), warn is triggered if 'active_list' is empty, which
is intended to confirm iocg is active when it has debt. However, warn
can be triggered during a blkcg or disk removal, if iocg_waitq_timer_fn()
is run at that time:
WARNING: CPU: 0 PID: 2344971 at block/blk-iocost.c:1402 iocg_pay_debt+0x14c/0x190
Call trace:
iocg_pay_debt+0x14c/0x190
iocg_kick_waitq+0x438/0x4c0
iocg_waitq_timer_fn+0xd8/0x130
__run_hrtimer+0x144/0x45c
__hrtimer_run_queues+0x16c/0x244
hrtimer_interrupt+0x2cc/0x7b0
The warn in this situation is meaningless. Since this iocg is being
removed, the state of the 'active_list' is irrelevant, and 'waitq_timer'
is canceled after removing 'active_list' in ioc_pd_free(), which ensures
iocg is freed after iocg_waitq_timer_fn() returns.
Therefore, add the check if iocg was already offlined to avoid warn
when removing a blkcg or disk.
References
Configurations
Configuration 1 (hide)
|
History
03 Nov 2025, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
30 Sep 2025, 17:51
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/01bc4fda9ea0a6b52f12326486f07a4910666cf6 - Patch | |
| References | () https://git.kernel.org/stable/c/14b3275f93d4a0d8ddc02195bc4e9869b7a3700e - Patch | |
| References | () https://git.kernel.org/stable/c/1c172ac7afe4442964f4153b2c78fe4e005d9d67 - Patch | |
| References | () https://git.kernel.org/stable/c/56a9d07f427378eeb75b917bb49c6fbea8204126 - Patch | |
| References | () https://git.kernel.org/stable/c/7d215e013d097ed6fc4b0ad0272c9514214dc408 - Patch | |
| References | () https://git.kernel.org/stable/c/aed0aac18f039dd4af13c143063754efca358cb0 - Patch | |
| CPE | cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| CWE | NVD-CWE-noinfo | |
| First Time |
Linux linux Kernel
Linux |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
02 May 2025, 07:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
25 Apr 2025, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Nov 2024, 09:22
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://git.kernel.org/stable/c/01bc4fda9ea0a6b52f12326486f07a4910666cf6 - | |
| References | () https://git.kernel.org/stable/c/14b3275f93d4a0d8ddc02195bc4e9869b7a3700e - | |
| References | () https://git.kernel.org/stable/c/1c172ac7afe4442964f4153b2c78fe4e005d9d67 - |
07 Nov 2024, 17:35
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
| Summary |
|
30 May 2024, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-05-30 16:15
Updated : 2025-11-03 20:16
NVD link : CVE-2024-36908
Mitre link : CVE-2024-36908
CVE.ORG link : CVE-2024-36908
JSON object : View
Products Affected
linux
- linux_kernel
CWE
