漏洞标题
SCSI:LPFC:在启用CMF的I/O过程中修复调用跟踪问题
漏洞描述信息
在Linux内核中,已修复以下漏洞:
scsi: lpfc: 解决在启用CMF时进行I/O操作时观察到的调用跟踪问题
在启用CMF时,观察到以下问题:
BUG:在可中断代码中使用smp_processor_id():systemd-udevd/31711
内核:调用者是lpfc_update_cmf_cmd+0x214/0x420 [lpfc]
内核:CPU: 12 PID: 31711 进程名: systemd-udevd
内核:调用跟踪:
内核: <TASK>
内核: dump_stack_lvl+0x44/0x57
内核: check_preemption_disabled+0xbf/0xe0
内核: lpfc_update_cmf_cmd+0x214/0x420 [lpfc]
内核: lpfc_nvme_fcp_io_submit+0x23b4/0x4df0 [lpfc]
this_cpu_ptr()在可中断上下文中调用了smp_processor_id()。
修复方法是使用raw_smp_processor_id()和per_cpu_ptr()替代。
CVSS信息
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
漏洞类别
信息暴露
漏洞标题
scsi: lpfc: Fix call trace observed during I/O with CMF enabled
漏洞描述信息
In the Linux kernel, the following vulnerability has been resolved:
scsi: lpfc: Fix call trace observed during I/O with CMF enabled
The following was seen with CMF enabled:
BUG: using smp_processor_id() in preemptible
code: systemd-udevd/31711
kernel: caller is lpfc_update_cmf_cmd+0x214/0x420 [lpfc]
kernel: CPU: 12 PID: 31711 Comm: systemd-udevd
kernel: Call Trace:
kernel: <TASK>
kernel: dump_stack_lvl+0x44/0x57
kernel: check_preemption_disabled+0xbf/0xe0
kernel: lpfc_update_cmf_cmd+0x214/0x420 [lpfc]
kernel: lpfc_nvme_fcp_io_submit+0x23b4/0x4df0 [lpfc]
this_cpu_ptr() calls smp_processor_id() in a preemptible context.
Fix by using per_cpu_ptr() with raw_smp_processor_id() instead.
CVSS信息
N/A
漏洞类别
N/A