{"id":"CVE-2024-43851","summary":"soc: xilinx: rename cpu_number1 to dummy_cpu_number","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: xilinx: rename cpu_number1 to dummy_cpu_number\n\nThe per cpu variable cpu_number1 is passed to xlnx_event_handler as\nargument \"dev_id\", but it is not used in this function. So drop the\ninitialization of this variable and rename it to dummy_cpu_number.\nThis patch is to fix the following call trace when the kernel option\nCONFIG_DEBUG_ATOMIC_SLEEP is enabled:\n\nBUG: sleeping function called from invalid context at include/linux/sched/mm.h:274\n    in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1, name: swapper/0\n    preempt_count: 1, expected: 0\n    CPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.1.0 #53\n    Hardware name: Xilinx Versal vmk180 Eval board rev1.1 (QSPI) (DT)\n    Call trace:\n     dump_backtrace+0xd0/0xe0\n     show_stack+0x18/0x40\n     dump_stack_lvl+0x7c/0xa0\n     dump_stack+0x18/0x34\n     __might_resched+0x10c/0x140\n     __might_sleep+0x4c/0xa0\n     __kmem_cache_alloc_node+0xf4/0x168\n     kmalloc_trace+0x28/0x38\n     __request_percpu_irq+0x74/0x138\n     xlnx_event_manager_probe+0xf8/0x298\n     platform_probe+0x68/0xd8","modified":"2026-04-02T12:18:21.915983Z","published":"2024-08-17T09:22:09.159Z","related":["MGASA-2024-0309","MGASA-2024-0310","SUSE-SU-2024:3194-1","SUSE-SU-2024:3195-1","SUSE-SU-2024:3383-1","SUSE-SU-2025:20044-1","SUSE-SU-2025:20047-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/43xxx/CVE-2024-43851.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/4a95449dd975e2ea6629a034f3e74b46c9634916"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a5e507fadab76393cbc12344ebd65a417a09aa46"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a96e60a6ea6818fd37b1853283a512c49af38cf5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f762acdaff9e54688be16e6c832c73a61533c1df"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/43xxx/CVE-2024-43851.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43851"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"01946c3c83b2279fec685abc83f0d7b0468851db"},{"fixed":"a5e507fadab76393cbc12344ebd65a417a09aa46"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"4722924e7a6225ebf7b09bd7ac5fafc6e73bd4f8"},{"fixed":"a96e60a6ea6818fd37b1853283a512c49af38cf5"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"daed80ed07580e5adc0e6d8bc79933a35154135a"},{"fixed":"f762acdaff9e54688be16e6c832c73a61533c1df"},{"fixed":"4a95449dd975e2ea6629a034f3e74b46c9634916"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"548bdbbdcd355f5a844c7122c83c9aab115051fa"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-43851.json"}}],"schema_version":"1.7.5"}