CVE-2022-50472
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
04/10/2025
Last modified:
23/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
IB/mad: Don&#39;t call to function that might sleep while in atomic context<br />
<br />
Tracepoints are not allowed to sleep, as such the following splat is<br />
generated due to call to ib_query_pkey() in atomic context.<br />
<br />
WARNING: CPU: 0 PID: 1888000 at kernel/trace/ring_buffer.c:2492 rb_commit+0xc1/0x220<br />
CPU: 0 PID: 1888000 Comm: kworker/u9:0 Kdump: loaded Tainted: G OE --------- - - 4.18.0-305.3.1.el8.x86_64 #1<br />
Hardware name: Red Hat KVM, BIOS 1.13.0-2.module_el8.3.0+555+a55c8938 04/01/2014<br />
Workqueue: ib-comp-unb-wq ib_cq_poll_work [ib_core]<br />
RIP: 0010:rb_commit+0xc1/0x220<br />
RSP: 0000:ffffa8ac80f9bca0 EFLAGS: 00010202<br />
RAX: ffff8951c7c01300 RBX: ffff8951c7c14a00 RCX: 0000000000000246<br />
RDX: ffff8951c707c000 RSI: ffff8951c707c57c RDI: ffff8951c7c14a00<br />
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000<br />
R10: ffff8951c7c01300 R11: 0000000000000001 R12: 0000000000000246<br />
R13: 0000000000000000 R14: ffffffff964c70c0 R15: 0000000000000000<br />
FS: 0000000000000000(0000) GS:ffff8951fbc00000(0000) knlGS:0000000000000000<br />
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br />
CR2: 00007f20e8f39010 CR3: 000000002ca10005 CR4: 0000000000170ef0<br />
Call Trace:<br />
ring_buffer_unlock_commit+0x1d/0xa0<br />
trace_buffer_unlock_commit_regs+0x3b/0x1b0<br />
trace_event_buffer_commit+0x67/0x1d0<br />
trace_event_raw_event_ib_mad_recv_done_handler+0x11c/0x160 [ib_core]<br />
ib_mad_recv_done+0x48b/0xc10 [ib_core]<br />
? trace_event_raw_event_cq_poll+0x6f/0xb0 [ib_core]<br />
__ib_process_cq+0x91/0x1c0 [ib_core]<br />
ib_cq_poll_work+0x26/0x80 [ib_core]<br />
process_one_work+0x1a7/0x360<br />
? create_worker+0x1a0/0x1a0<br />
worker_thread+0x30/0x390<br />
? create_worker+0x1a0/0x1a0<br />
kthread+0x116/0x130<br />
? kthread_flush_work_fn+0x10/0x10<br />
ret_from_fork+0x35/0x40<br />
---[ end trace 78ba8509d3830a16 ]---
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.2 (including) | 5.15.86 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.0.16 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1 (including) | 6.1.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



