{"id":"CVE-2022-49434","summary":"PCI: Avoid pci_dev_lock() AB/BA deadlock with sriov_numvfs_store()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: Avoid pci_dev_lock() AB/BA deadlock with sriov_numvfs_store()\n\nThe sysfs sriov_numvfs_store() path acquires the device lock before the\nconfig space access lock:\n\n  sriov_numvfs_store\n    device_lock                 # A (1) acquire device lock\n    sriov_configure\n      vfio_pci_sriov_configure  # (for example)\n        vfio_pci_core_sriov_configure\n          pci_disable_sriov\n            sriov_disable\n              pci_cfg_access_lock\n                pci_wait_cfg    # B (4) wait for dev-\u003eblock_cfg_access == 0\n\nPreviously, pci_dev_lock() acquired the config space access lock before the\ndevice lock:\n\n  pci_dev_lock\n    pci_cfg_access_lock\n      dev-\u003eblock_cfg_access = 1 # B (2) set dev-\u003eblock_cfg_access = 1\n    device_lock                 # A (3) wait for device lock\n\nAny path that uses pci_dev_lock(), e.g., pci_reset_function(), may\ndeadlock with sriov_numvfs_store() if the operations occur in the sequence\n(1) (2) (3) (4).\n\nAvoid the deadlock by reversing the order in pci_dev_lock() so it acquires\nthe device lock before the config space access lock, the same as the\nsriov_numvfs_store() path.\n\n[bhelgaas: combined and adapted commit log from Jay Zhou's independent\nsubsequent posting:\nhttps://lore.kernel.org/r/20220404062539.1710-1-jianjay.zhou@huawei.com]","modified":"2026-04-02T08:27:36.414424Z","published":"2025-02-26T02:12:51.068Z","related":["SUSE-SU-2025:1027-1","SUSE-SU-2025:1176-1","SUSE-SU-2025:1183-1","SUSE-SU-2025:1241-1","SUSE-SU-2025:1293-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49434.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/2cdd5284035322795b0964f899eefba254cfe483"},{"type":"WEB","url":"https://git.kernel.org/stable/c/59ea6b3ae51df7cd6bfd84c9c0030609b9315622"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a91ee0e9fca9d7501286cfbced9b30a33e52740a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/aed6d4d519210c28817948f34c53b6e058e0456c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c3c6dc1853b8bf3c718f96fd8480a6eb09ba4831"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c9a81f9ed6ae3554621d6a50220b1bc74b67d81e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ea047f51172aa68841adef7f52d375002438b8f0"},{"type":"WEB","url":"https://git.kernel.org/stable/c/eff3587b9c01439b738298475e555c028ac9f55e"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/49xxx/CVE-2022-49434.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-49434"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"17530e71e0166a37f8e20a9b7bcf1d50ae3cff8e"},{"fixed":"c3c6dc1853b8bf3c718f96fd8480a6eb09ba4831"},{"fixed":"aed6d4d519210c28817948f34c53b6e058e0456c"},{"fixed":"c9a81f9ed6ae3554621d6a50220b1bc74b67d81e"},{"fixed":"eff3587b9c01439b738298475e555c028ac9f55e"},{"fixed":"2cdd5284035322795b0964f899eefba254cfe483"},{"fixed":"ea047f51172aa68841adef7f52d375002438b8f0"},{"fixed":"59ea6b3ae51df7cd6bfd84c9c0030609b9315622"},{"fixed":"a91ee0e9fca9d7501286cfbced9b30a33e52740a"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49434.json"}}],"schema_version":"1.7.5"}