CVE-2022-49537

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-49537
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-49537.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-49537
Downstream
Related
Published
2025-02-26T07:01:29Z
Modified
2025-08-09T19:01:29Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix call trace observed during I/O with CMF enabled

The following was seen with CMF enabled:

BUG: using smpprocessorid() in preemptible code: systemd-udevd/31711 kernel: caller is lpfcupdatecmfcmd+0x214/0x420 [lpfc] kernel: CPU: 12 PID: 31711 Comm: systemd-udevd kernel: Call Trace: kernel: <TASK> kernel: dumpstacklvl+0x44/0x57 kernel: checkpreemptiondisabled+0xbf/0xe0 kernel: lpfcupdatecmfcmd+0x214/0x420 [lpfc] kernel: lpfcnvmefcpiosubmit+0x23b4/0x4df0 [lpfc]

thiscpuptr() calls smpprocessorid() in a preemptible context.

Fix by using percpuptr() with rawsmpprocessor_id() instead.

References

Affected packages