In the Linux kernel, a vulnerability has been discovered, which has now been resolved by the developers. This vulnerability specifically affects MIPS: Loongson64: DTS (Device Tree Source) in the Linux kernel and deals with the handling of PCIe port nodes for ls7a. As a result, the kernel developers have released a fix that addresses this issue and prevents potential security risks.
The vulnerability was found in the following dtc warnings in the Linux kernel
arch/mips/boot/dts/loongson/ls7a-pch.dtsi:68.16-416.5: Warning (interrupt_provider): /bus@10000000/pci@1a000000: '#interrupt-cells' found, but node is not an interrupt provider
arch/mips/boot/dts/loongson/ls7a-pch.dtsi:68.16-416.5: Warning (interrupt_provider): /bus@10000000/pci@1a000000: '#interrupt-cells' found, but node is not an interrupt provider
arch/mips/boot/dts/loongson/loongson64g_4core_ls7a.dtb: Warning (interrupt_map): Failed prerequisite 'interrupt_provider'
Additionally, a runtime warning was introduced in commit 045b14ca5c36 ("of: WARN on deprecated #address-cells/#size-cells handling"):
WARNING: CPU: PID: 1 at drivers/of/base.c:106 of_bus_n_addr_cells+x9c/xe
Missing '#address-cells' in /bus@10000000/pci@1a000000/pci_bridge@9,
The Fix
The developers have provided a fix similar to commit d89a415ff8d5 ("MIPS: Loongson64: DTS: Fix PCIe port nodes for ls7a"), which had previously resolved a similar issue for ls2k (despite its subject mentioning ls7a).
Original References
- MIPS: Loongson64: DTS: Fix PCIe port nodes for ls7a - commit d89a415ff8d5
- of: WARN on deprecated #address-cells/#size-cells handling - commit 045b14ca5c36
Exploit Details
At this time, no known exploits directly impact this vulnerability; however, it is crucial to apply the provided fix to ensure system security and stability.
In conclusion, the vulnerability found in the Linux kernel involving the handling of PCIe port nodes for MIPS: Loongson64: DTS has been fixed by the developers. It is essential for users to update their systems in order to patch this vulnerability and prevent any potential security risks. As always, it is recommended to keep your system up-to-date with the latest security fixes to ensure optimal system security.
Timeline
Published on: 01/08/2025 18:15:19 UTC
Last modified on: 01/20/2025 06:28:07 UTC