nvme-fabrics: use reserved tag for reg read/write command
In some scenarios, if too many commands are issued by nvme command in
the same time by user tasks, this may exhaust all tags of admin_q. If
a reset (nvme reset or IO timeout) occurs before these commands finish,
reconnect routine may fail to update nvme regs due to insufficient tags,
which will cause kernel hang forever. In order to workaround this issue,
maybe we can let reg_read32()/reg_read64()/reg_write32() use reserved
tags. This maybe safe for nvmf:
1. For the disable ctrl path, we will not issue connect command
2. For the enable ctrl / fw activate path, since connect and reg_xx()
are called serially.
So the reserved tags may still be enough while reg_xx() use reserved tags.
Metrics
Affected Vendors & Products
| Source | ID | Title | 
|---|---|---|
  Ubuntu USN | 
                USN-7089-1 | Linux kernel vulnerabilities | 
  Ubuntu USN | 
                USN-7089-2 | Linux kernel vulnerabilities | 
  Ubuntu USN | 
                USN-7089-3 | Linux kernel vulnerabilities | 
  Ubuntu USN | 
                USN-7089-4 | Linux kernel vulnerabilities | 
  Ubuntu USN | 
                USN-7089-5 | Linux kernel vulnerabilities | 
  Ubuntu USN | 
                USN-7089-6 | Linux kernel vulnerabilities | 
  Ubuntu USN | 
                USN-7089-7 | Linux kernel (Low Latency) vulnerabilities | 
  Ubuntu USN | 
                USN-7090-1 | Linux kernel vulnerabilities | 
  Ubuntu USN | 
                USN-7095-1 | Linux kernel vulnerabilities | 
  Ubuntu USN | 
                USN-7156-1 | Linux kernel (GKE) vulnerabilities | 
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 09 Oct 2025 18:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Linux
         Linux linux Kernel  | 
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*  | 
|
| Vendors & Products | 
        
        Linux
         Linux linux Kernel  | 
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        
        epss
         
  | 
    
        
        
        epss
         
  | 
Mon, 05 May 2025 21:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Wed, 13 Nov 2024 02:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Redhat
         Redhat enterprise Linux  | 
|
| CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/o:redhat:enterprise_linux:9  | 
|
| Vendors & Products | 
        
        Redhat
         Redhat enterprise Linux  | 
Wed, 11 Sep 2024 18:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
    
Wed, 11 Sep 2024 13:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Mon, 19 Aug 2024 22:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | CWE-99 | 
Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-05-04T09:21:40.432Z
Reserved: 2024-07-12T12:17:45.633Z
Link: CVE-2024-41082
Updated: 2024-08-02T04:46:52.643Z
Status : Analyzed
Published: 2024-07-29T15:15:15.670
Modified: 2025-10-09T18:01:11.217
Link: CVE-2024-41082
                        OpenCVE Enrichment
                    No data.
 Ubuntu USN