Acknowledged
Created: Oct 10, 2025
Updated: Oct 17, 2025
Found In Version: 10.22.33.1
Severity: Standard
Applicable for: Wind River Linux LTS 22
Component/s: Kernel
In the Linux kernel, the following vulnerability has been resolved:[EOL][EOL]thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to avoid crash[EOL][EOL]When CPU 0 is offline and intel_powerclamp is used to inject[EOL]idle, it generates kernel BUG:[EOL][EOL]BUG: using smp_processor_id() in preemptible [00000000] code: bash/15687[EOL]caller is debug_smp_processor_id+0x17/0x20[EOL]CPU: 4 PID: 15687 Comm: bash Not tainted 5.19.0-rc7+ #57[EOL]Call Trace:[EOL]<TASK>[EOL]dump_stack_lvl+0x49/0x63[EOL]dump_stack+0x10/0x16[EOL]check_preemption_disabled+0xdd/0xe0[EOL]debug_smp_processor_id+0x17/0x20[EOL]powerclamp_set_cur_state+0x7f/0xf9 [intel_powerclamp][EOL]...[EOL]...[EOL][EOL]Here CPU 0 is the control CPU by default and changed to the current CPU,[EOL]if CPU 0 offlined. This check has to be performed under cpus_read_lock(),[EOL]hence the above warning.[EOL][EOL]Use get_cpu() instead of smp_processor_id() to avoid this BUG.[EOL][EOL][ rjw: Subject edits ]