CVE-2022-50171
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/06/2025
Last modified:
28/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
crypto: hisilicon/sec - don&#39;t sleep when in softirq<br />
<br />
When kunpeng920 encryption driver is used to deencrypt and decrypt<br />
packets during the softirq, it is not allowed to use mutex lock. The<br />
kernel will report the following error:<br />
<br />
BUG: scheduling while atomic: swapper/57/0/0x00000300<br />
Call trace:<br />
dump_backtrace+0x0/0x1e4<br />
show_stack+0x20/0x2c<br />
dump_stack+0xd8/0x140<br />
__schedule_bug+0x68/0x80<br />
__schedule+0x728/0x840<br />
schedule+0x50/0xe0<br />
schedule_preempt_disabled+0x18/0x24<br />
__mutex_lock.constprop.0+0x594/0x5dc<br />
__mutex_lock_slowpath+0x1c/0x30<br />
mutex_lock+0x50/0x60<br />
sec_request_init+0x8c/0x1a0 [hisi_sec2]<br />
sec_process+0x28/0x1ac [hisi_sec2]<br />
sec_skcipher_crypto+0xf4/0x1d4 [hisi_sec2]<br />
sec_skcipher_encrypt+0x1c/0x30 [hisi_sec2]<br />
crypto_skcipher_encrypt+0x2c/0x40<br />
crypto_authenc_encrypt+0xc8/0xfc [authenc]<br />
crypto_aead_encrypt+0x2c/0x40<br />
echainiv_encrypt+0x144/0x1a0 [echainiv]<br />
crypto_aead_encrypt+0x2c/0x40<br />
esp_output_tail+0x348/0x5c0 [esp4]<br />
esp_output+0x120/0x19c [esp4]<br />
xfrm_output_one+0x25c/0x4d4<br />
xfrm_output_resume+0x6c/0x1fc<br />
xfrm_output+0xac/0x3c0<br />
xfrm4_output+0x64/0x130<br />
ip_build_and_send_pkt+0x158/0x20c<br />
tcp_v4_send_synack+0xdc/0x1f0<br />
tcp_conn_request+0x7d0/0x994<br />
tcp_v4_conn_request+0x58/0x6c<br />
tcp_v6_conn_request+0xf0/0x100<br />
tcp_rcv_state_process+0x1cc/0xd60<br />
tcp_v4_do_rcv+0x10c/0x250<br />
tcp_v4_rcv+0xfc4/0x10a4<br />
ip_protocol_deliver_rcu+0xf4/0x200<br />
ip_local_deliver_finish+0x58/0x70<br />
ip_local_deliver+0x68/0x120<br />
ip_sublist_rcv_finish+0x70/0x94<br />
ip_list_rcv_finish.constprop.0+0x17c/0x1d0<br />
ip_sublist_rcv+0x40/0xb0<br />
ip_list_rcv+0x140/0x1dc<br />
__netif_receive_skb_list_core+0x154/0x28c<br />
__netif_receive_skb_list+0x120/0x1a0<br />
netif_receive_skb_list_internal+0xe4/0x1f0<br />
napi_complete_done+0x70/0x1f0<br />
gro_cell_poll+0x9c/0xb0<br />
napi_poll+0xcc/0x264<br />
net_rx_action+0xd4/0x21c<br />
__do_softirq+0x130/0x358<br />
irq_exit+0x11c/0x13c<br />
__handle_domain_irq+0x88/0xf0<br />
gic_handle_irq+0x78/0x2c0<br />
el1_irq+0xb8/0x140<br />
arch_cpu_idle+0x18/0x40<br />
default_idle_call+0x5c/0x1c0<br />
cpuidle_idle_call+0x174/0x1b0<br />
do_idle+0xc8/0x160<br />
cpu_startup_entry+0x30/0x11c<br />
secondary_start_kernel+0x158/0x1e4<br />
softirq: huh, entered softirq 3 NET_RX 0000000093774ee4 with<br />
preempt_count 00000100, exited with fffffe00?
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.137 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.61 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.18.18 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.19 (including) | 5.19.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/02884a4f12de11f54d4ca67a07dd1f111d96fdbd
- https://git.kernel.org/stable/c/16e18a8ac7c9748cf35a8d2f0ba2c6e8850e7568
- https://git.kernel.org/stable/c/4a461ba5b9753352f438824fdd915cba675b1733
- https://git.kernel.org/stable/c/aa495dfe71229b9034b59d8072ff0b2325ddd5ee
- https://git.kernel.org/stable/c/c9be45e4c69fde36522274f04d1aa0d097ae3958



