Home

Description

In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix hard lockup when reading the rx_monitor from debugfs During I/O and simultaneous cat of /sys/kernel/debug/lpfc/fnX/rx_monitor, a hard lockup similar to the call trace below may occur. The spin_lock_bh in lpfc_rx_monitor_report is not protecting from timer interrupts as expected, so change the strength of the spin lock to _irq. Kernel panic - not syncing: Hard LOCKUP CPU: 3 PID: 110402 Comm: cat Kdump: loaded exception RIP: native_queued_spin_lock_slowpath+91 [IRQ stack] native_queued_spin_lock_slowpath at ffffffffb814e30b _raw_spin_lock at ffffffffb89a667a lpfc_rx_monitor_record at ffffffffc0a73a36 [lpfc] lpfc_cmf_timer at ffffffffc0abbc67 [lpfc] __hrtimer_run_queues at ffffffffb8184250 hrtimer_interrupt at ffffffffb8184ab0 smp_apic_timer_interrupt at ffffffffb8a026ba apic_timer_interrupt at ffffffffb8a01c4f [End of IRQ stack] apic_timer_interrupt at ffffffffb8a01c4f lpfc_rx_monitor_report at ffffffffc0a73c80 [lpfc] lpfc_rx_monitor_read at ffffffffc0addde1 [lpfc] full_proxy_read at ffffffffb83e7fc3 vfs_read at ffffffffb833fe71 ksys_read at ffffffffb83402af do_syscall_64 at ffffffffb800430b entry_SYSCALL_64_after_hwframe at ffffffffb8a000ad

PUBLISHED Reserved 2025-12-24 | Published 2025-12-24 | Updated 2025-12-24 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 2cf66428a2545bb33beb9624124a2377468bb478
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before cd542900ee5147028bbe603b238efcab8d720838
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 39761417ea7b654217d6d9085afbf7c87ba3675d
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before c44e50f4a0ec00c2298f31f91bc2c3e9bbd81c7e
affected

Default status
affected

5.15.86 (semver)
unaffected

6.0.16 (semver)
unaffected

6.1.2 (semver)
unaffected

6.2 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/2cf66428a2545bb33beb9624124a2377468bb478

git.kernel.org/...c/cd542900ee5147028bbe603b238efcab8d720838

git.kernel.org/...c/39761417ea7b654217d6d9085afbf7c87ba3675d

git.kernel.org/...c/c44e50f4a0ec00c2298f31f91bc2c3e9bbd81c7e

cve.org (CVE-2022-50744)

nvd.nist.gov (CVE-2022-50744)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.