Bug 2347857 (CVE-2022-49542) - CVE-2022-49542 kernel: scsi: lpfc: Move cfg_log_verbose check before calling lpfc_dmp_dbg()
Summary: CVE-2022-49542 kernel: scsi: lpfc: Move cfg_log_verbose check before calling ...
Keywords:
Status: NEW
Alias: CVE-2022-49542
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-02-26 03:09 UTC by OSIDB Bzimport
Modified: 2025-02-26 18:10 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-02-26 03:09:10 UTC
In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Move cfg_log_verbose check before calling lpfc_dmp_dbg()

In an attempt to log message 0126 with LOG_TRACE_EVENT, the following hard
lockup call trace hangs the system.

Call Trace:
 _raw_spin_lock_irqsave+0x32/0x40
 lpfc_dmp_dbg.part.32+0x28/0x220 [lpfc]
 lpfc_cmpl_els_fdisc+0x145/0x460 [lpfc]
 lpfc_sli_cancel_jobs+0x92/0xd0 [lpfc]
 lpfc_els_flush_cmd+0x43c/0x670 [lpfc]
 lpfc_els_flush_all_cmd+0x37/0x60 [lpfc]
 lpfc_sli4_async_event_proc+0x956/0x1720 [lpfc]
 lpfc_do_work+0x1485/0x1d70 [lpfc]
 kthread+0x112/0x130
 ret_from_fork+0x1f/0x40
Kernel panic - not syncing: Hard LOCKUP

The same CPU tries to claim the phba->port_list_lock twice.

Move the cfg_log_verbose checks as part of the lpfc_printf_vlog() and
lpfc_printf_log() macros before calling lpfc_dmp_dbg().  There is no need
to take the phba->port_list_lock within lpfc_dmp_dbg().

Comment 1 Avinash Hanwate 2025-02-26 13:49:48 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025022614-CVE-2022-49542-8f78@gregkh/T

Comment 4 Avinash Hanwate 2025-02-26 18:00:28 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025022614-CVE-2022-49542-8f78@gregkh/T


Note You need to log in before you can comment on or make changes to this bug.