{"id":"CVE-2023-54000","summary":"net: hns3: fix deadlock issue when externel_lb and reset are executed together","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: fix deadlock issue when externel_lb and reset are executed together\n\nWhen externel_lb and reset are executed together, a deadlock may\noccur:\n[ 3147.217009] INFO: task kworker/u321:0:7 blocked for more than 120 seconds.\n[ 3147.230483] \"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n[ 3147.238999] task:kworker/u321:0  state:D stack:    0 pid:    7 ppid:     2 flags:0x00000008\n[ 3147.248045] Workqueue: hclge hclge_service_task [hclge]\n[ 3147.253957] Call trace:\n[ 3147.257093]  __switch_to+0x7c/0xbc\n[ 3147.261183]  __schedule+0x338/0x6f0\n[ 3147.265357]  schedule+0x50/0xe0\n[ 3147.269185]  schedule_preempt_disabled+0x18/0x24\n[ 3147.274488]  __mutex_lock.constprop.0+0x1d4/0x5dc\n[ 3147.279880]  __mutex_lock_slowpath+0x1c/0x30\n[ 3147.284839]  mutex_lock+0x50/0x60\n[ 3147.288841]  rtnl_lock+0x20/0x2c\n[ 3147.292759]  hclge_reset_prepare+0x68/0x90 [hclge]\n[ 3147.298239]  hclge_reset_subtask+0x88/0xe0 [hclge]\n[ 3147.303718]  hclge_reset_service_task+0x84/0x120 [hclge]\n[ 3147.309718]  hclge_service_task+0x2c/0x70 [hclge]\n[ 3147.315109]  process_one_work+0x1d0/0x490\n[ 3147.319805]  worker_thread+0x158/0x3d0\n[ 3147.324240]  kthread+0x108/0x13c\n[ 3147.328154]  ret_from_fork+0x10/0x18\n\nIn externel_lb process, the hns3 driver call napi_disable()\nfirst, then the reset happen, then the restore process of the\nexternel_lb will fail, and will not call napi_enable(). When\ndoing externel_lb again, napi_disable() will be double call,\ncause a deadlock of rtnl_lock().\n\nThis patch use the HNS3_NIC_STATE_DOWN state to protect the\ncalling of napi_disable() and napi_enable() in externel_lb\nprocess, just as the usage in ndo_stop() and ndo_start().","modified":"2026-03-31T17:29:19.501389653Z","published":"2025-12-24T10:55:36.216Z","related":["SUSE-SU-2026:0278-1","SUSE-SU-2026:0281-1","SUSE-SU-2026:0293-1","SUSE-SU-2026:0315-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54000.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/743f7c1762e098048ede8cdf8c89a118f8d12391"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ac6257a3ae5db5193b1f19c268e4f72d274ddb88"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d9f609cb50ebab4aa6341112f406bf9d3928ac81"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ef2d6bf9695669d31ece9f2ef39dec84874a87c7"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54000.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54000"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"85fc1d802edf36123ae1bd0a13892bb3772c197f"},{"fixed":"d9f609cb50ebab4aa6341112f406bf9d3928ac81"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"04b6ba143521f4485b7f2c36c655b262a79dae97"},{"fixed":"743f7c1762e098048ede8cdf8c89a118f8d12391"},{"fixed":"ef2d6bf9695669d31ece9f2ef39dec84874a87c7"},{"fixed":"ac6257a3ae5db5193b1f19c268e4f72d274ddb88"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54000.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"6.1.0"},{"fixed":"6.1.46"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.4.11"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-54000.json"}}],"schema_version":"1.7.5"}