We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-21986

net: switchdev: Convert blocking notification chain to a raw one



Description

In the Linux kernel, the following vulnerability has been resolved: net: switchdev: Convert blocking notification chain to a raw one A blocking notification chain uses a read-write semaphore to protect the integrity of the chain. The semaphore is acquired for writing when adding / removing notifiers to / from the chain and acquired for reading when traversing the chain and informing notifiers about an event. In case of the blocking switchdev notification chain, recursive notifications are possible which leads to the semaphore being acquired twice for reading and to lockdep warnings being generated [1]. Specifically, this can happen when the bridge driver processes a SWITCHDEV_BRPORT_UNOFFLOADED event which causes it to emit notifications about deferred events when calling switchdev_deferred_process(). Fix this by converting the notification chain to a raw notification chain in a similar fashion to the netdev notification chain. Protect the chain using the RTNL mutex by acquiring it when modifying the chain. Events are always informed under the RTNL mutex, but add an assertion in call_switchdev_blocking_notifiers() to make sure this is not violated in the future. Maintain the "blocking" prefix as events are always emitted from process context and listeners are allowed to block. [1]: WARNING: possible recursive locking detected 6.14.0-rc4-custom-g079270089484 #1 Not tainted -------------------------------------------- ip/52731 is trying to acquire lock: ffffffff850918d8 ((switchdev_blocking_notif_chain).rwsem){++++}-{4:4}, at: blocking_notifier_call_chain+0x58/0xa0 but task is already holding lock: ffffffff850918d8 ((switchdev_blocking_notif_chain).rwsem){++++}-{4:4}, at: blocking_notifier_call_chain+0x58/0xa0 other info that might help us debug this: Possible unsafe locking scenario: CPU0 ---- lock((switchdev_blocking_notif_chain).rwsem); lock((switchdev_blocking_notif_chain).rwsem); *** DEADLOCK *** May be due to missing lock nesting notation 3 locks held by ip/52731: #0: ffffffff84f795b0 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0x727/0x1dc0 #1: ffffffff8731f628 (&net->rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0x790/0x1dc0 #2: ffffffff850918d8 ((switchdev_blocking_notif_chain).rwsem){++++}-{4:4}, at: blocking_notifier_call_chain+0x58/0xa0 stack backtrace: ... ? __pfx_down_read+0x10/0x10 ? __pfx_mark_lock+0x10/0x10 ? __pfx_switchdev_port_attr_set_deferred+0x10/0x10 blocking_notifier_call_chain+0x58/0xa0 switchdev_port_attr_notify.constprop.0+0xb3/0x1b0 ? __pfx_switchdev_port_attr_notify.constprop.0+0x10/0x10 ? mark_held_locks+0x94/0xe0 ? switchdev_deferred_process+0x11a/0x340 switchdev_port_attr_set_deferred+0x27/0xd0 switchdev_deferred_process+0x164/0x340 br_switchdev_port_unoffload+0xc8/0x100 [bridge] br_switchdev_blocking_event+0x29f/0x580 [bridge] notifier_call_chain+0xa2/0x440 blocking_notifier_call_chain+0x6e/0xa0 switchdev_bridge_port_unoffload+0xde/0x1a0 ...

Reserved 2024-12-29 | Published 2025-04-01 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

91ac2c79e896b28a4a3a262384689ee6dfeaf083 before af757f5ee3f754c5dceefb05c12ff37cb46fc682
affected

a83856bd0c240267a86ce3388f3437d6ba5ac5ca before 1f7d051814e7a0cb1f0717ed5527c1059992129d
affected

f7a70d650b0b6b0134ccba763d672c8439d9f09b before a597d4b75669ec82c72cbee9fe75a15d04b35b2b
affected

f7a70d650b0b6b0134ccba763d672c8439d9f09b before f9ed3fb50b872bd78bcb01f25087f9e4e25085d8
affected

f7a70d650b0b6b0134ccba763d672c8439d9f09b before 62531a1effa87bdab12d5104015af72e60d926ff
affected

a7589eca09929c3cc2a62950ef7f40bcc58afe3a
affected

Default status
affected

6.8
affected

Any version before 6.8
unaffected

6.1.132
unaffected

6.6.84
unaffected

6.12.20
unaffected

6.13.8
unaffected

6.14
unaffected

References

git.kernel.org/...c/af757f5ee3f754c5dceefb05c12ff37cb46fc682

git.kernel.org/...c/1f7d051814e7a0cb1f0717ed5527c1059992129d

git.kernel.org/...c/a597d4b75669ec82c72cbee9fe75a15d04b35b2b

git.kernel.org/...c/f9ed3fb50b872bd78bcb01f25087f9e4e25085d8

git.kernel.org/...c/62531a1effa87bdab12d5104015af72e60d926ff

cve.org (CVE-2025-21986)

nvd.nist.gov (CVE-2025-21986)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-21986

Support options

Helpdesk Chat, Email, Knowledgebase