scsi: qedf: Make qedf_execute_tmf() non-preemptible
Stop calling smp_processor_id() from preemptible code in
qedf_execute_tmf90. This results in BUG_ON() when running an RT kernel.
[ 659.343280] BUG: using smp_processor_id() in preemptible [00000000] code: sg_reset/3646
[ 659.343282] caller is qedf_execute_tmf+0x8b/0x360 [qedf]
Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
DLA-4008-1 | linux-6.1 security update |
![]() |
DSA-5747-1 | linux security update |
![]() |
USN-7003-1 | Linux kernel vulnerabilities |
![]() |
USN-7003-2 | Linux kernel vulnerabilities |
![]() |
USN-7003-3 | Linux kernel vulnerabilities |
![]() |
USN-7003-4 | Linux kernel vulnerabilities |
![]() |
USN-7003-5 | Linux kernel vulnerabilities |
![]() |
USN-7006-1 | Linux kernel vulnerabilities |
![]() |
USN-7007-1 | Linux kernel vulnerabilities |
![]() |
USN-7007-2 | Linux kernel vulnerabilities |
![]() |
USN-7007-3 | Linux kernel vulnerabilities |
![]() |
USN-7009-1 | Linux kernel vulnerabilities |
![]() |
USN-7009-2 | Linux kernel vulnerabilities |
![]() |
USN-7019-1 | Linux kernel vulnerabilities |
![]() |
USN-7089-1 | Linux kernel vulnerabilities |
![]() |
USN-7089-2 | Linux kernel vulnerabilities |
![]() |
USN-7089-3 | Linux kernel vulnerabilities |
![]() |
USN-7089-4 | Linux kernel vulnerabilities |
![]() |
USN-7089-5 | Linux kernel vulnerabilities |
![]() |
USN-7089-6 | Linux kernel vulnerabilities |
![]() |
USN-7089-7 | Linux kernel (Low Latency) vulnerabilities |
![]() |
USN-7090-1 | Linux kernel vulnerabilities |
![]() |
USN-7095-1 | Linux kernel vulnerabilities |
![]() |
USN-7156-1 | Linux kernel (GKE) vulnerabilities |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 06 Oct 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linux
Linux linux Kernel |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
Vendors & Products |
Linux
Linux linux Kernel |
Thu, 12 Dec 2024 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat rhel Eus
|
|
CPEs | cpe:/a:redhat:rhel_eus:9.4 | |
Vendors & Products |
Redhat rhel Eus
|
Wed, 13 Nov 2024 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/a:redhat:enterprise_linux:9 cpe:/o:redhat:enterprise_linux:9 |
Tue, 05 Nov 2024 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 24 Sep 2024 11:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/o:redhat:enterprise_linux:8 |
Tue, 24 Sep 2024 06:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat enterprise Linux |
|
CPEs | cpe:/a:redhat:enterprise_linux:8::nfv | |
Vendors & Products |
Redhat
Redhat enterprise Linux |
Thu, 12 Sep 2024 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 11 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 27 Aug 2024 02:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-372 |

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-07-28T11:16:35.896Z
Reserved: 2024-07-29T15:50:41.179Z
Link: CVE-2024-42124

Updated: 2024-08-02T04:54:32.246Z

Status : Analyzed
Published: 2024-07-30T08:15:04.577
Modified: 2025-10-06T17:33:16.307
Link: CVE-2024-42124


No data.