{"id":"CVE-2024-26787","summary":"mmc: mmci: stm32: fix DMA API overlapping mappings warning","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: mmci: stm32: fix DMA API overlapping mappings warning\n\nTurning on CONFIG_DMA_API_DEBUG_SG results in the following warning:\n\nDMA-API: mmci-pl18x 48220000.mmc: cacheline tracking EEXIST,\noverlapping mappings aren't supported\nWARNING: CPU: 1 PID: 51 at kernel/dma/debug.c:568\nadd_dma_entry+0x234/0x2f4\nModules linked in:\nCPU: 1 PID: 51 Comm: kworker/1:2 Not tainted 6.1.28 #1\nHardware name: STMicroelectronics STM32MP257F-EV1 Evaluation Board (DT)\nWorkqueue: events_freezable mmc_rescan\nCall trace:\nadd_dma_entry+0x234/0x2f4\ndebug_dma_map_sg+0x198/0x350\n__dma_map_sg_attrs+0xa0/0x110\ndma_map_sg_attrs+0x10/0x2c\nsdmmc_idma_prep_data+0x80/0xc0\nmmci_prep_data+0x38/0x84\nmmci_start_data+0x108/0x2dc\nmmci_request+0xe4/0x190\n__mmc_start_request+0x68/0x140\nmmc_start_request+0x94/0xc0\nmmc_wait_for_req+0x70/0x100\nmmc_send_tuning+0x108/0x1ac\nsdmmc_execute_tuning+0x14c/0x210\nmmc_execute_tuning+0x48/0xec\nmmc_sd_init_uhs_card.part.0+0x208/0x464\nmmc_sd_init_card+0x318/0x89c\nmmc_attach_sd+0xe4/0x180\nmmc_rescan+0x244/0x320\n\nDMA API debug brings to light leaking dma-mappings as dma_map_sg and\ndma_unmap_sg are not correctly balanced.\n\nIf an error occurs in mmci_cmd_irq function, only mmci_dma_error\nfunction is called and as this API is not managed on stm32 variant,\ndma_unmap_sg is never called in this error path.","modified":"2026-04-02T10:05:59.436981Z","published":"2024-04-04T08:20:19.751Z","related":["SUSE-SU-2024:1490-1","SUSE-SU-2024:1659-1","SUSE-SU-2024:1663-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26787.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0224cbc53ba82b84affa7619b6d1b1a254bc2c53"},{"type":"WEB","url":"https://git.kernel.org/stable/c/176e66269f0de327375fc0ea51c12c2f5a97e4c4"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5ae5060e17a3fc38e54c3e5bd8abd6b1d5bfae7c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6b1ba3f9040be5efc4396d86c9752cdc564730be"},{"type":"WEB","url":"https://git.kernel.org/stable/c/70af82bb9c897faa25a44e4181f36c60312b71ef"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d610a307225951929b9dff807788439454476f85"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/26xxx/CVE-2024-26787.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26787"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"46b723dd867d599420fb640c0eaf2a866ef721d4"},{"fixed":"0224cbc53ba82b84affa7619b6d1b1a254bc2c53"},{"fixed":"5ae5060e17a3fc38e54c3e5bd8abd6b1d5bfae7c"},{"fixed":"70af82bb9c897faa25a44e4181f36c60312b71ef"},{"fixed":"176e66269f0de327375fc0ea51c12c2f5a97e4c4"},{"fixed":"d610a307225951929b9dff807788439454476f85"},{"fixed":"6b1ba3f9040be5efc4396d86c9752cdc564730be"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-26787.json"}}],"schema_version":"1.7.5"}