We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-50225

riscv:uprobe fix SR_SPIE set/clear handling



Description

In the Linux kernel, the following vulnerability has been resolved: riscv:uprobe fix SR_SPIE set/clear handling In riscv the process of uprobe going to clear spie before exec the origin insn,and set spie after that.But When access the page which origin insn has been placed a page fault may happen and irq was disabled in arch_uprobe_pre_xol function,It cause a WARN as follows. There is no need to clear/set spie in arch_uprobe_pre/post/abort_xol. We can just remove it. [ 31.684157] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1488 [ 31.684677] in_atomic(): 0, irqs_disabled(): 1, non_block: 0, pid: 76, name: work [ 31.684929] preempt_count: 0, expected: 0 [ 31.685969] CPU: 2 PID: 76 Comm: work Tainted: G [ 31.686542] Hardware name: riscv-virtio,qemu (DT) [ 31.686797] Call Trace: [ 31.687053] [<ffffffff80006442>] dump_backtrace+0x30/0x38 [ 31.687699] [<ffffffff80812118>] show_stack+0x40/0x4c [ 31.688141] [<ffffffff8081817a>] dump_stack_lvl+0x44/0x5c [ 31.688396] [<ffffffff808181aa>] dump_stack+0x18/0x20 [ 31.688653] [<ffffffff8003e454>] __might_resched+0x114/0x122 [ 31.688948] [<ffffffff8003e4b2>] __might_sleep+0x50/0x7a [ 31.689435] [<ffffffff80822676>] down_read+0x30/0x130 [ 31.689728] [<ffffffff8000b650>] do_page_fault+0x166/x446 [ 31.689997] [<ffffffff80003c0c>] ret_from_exception+0x0/0xc

Reserved 2025-06-18 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linux

Product status

Default status
unaffected

74784081aac8a0f3636965fc230e2d3b7cc123c6 before c71e000db8536d27ec410abb3e314896a78b4f19
affected

74784081aac8a0f3636965fc230e2d3b7cc123c6 before 3811d51778900064d27d8c9a98f73410fb3b471d
affected

74784081aac8a0f3636965fc230e2d3b7cc123c6 before 73fc099eaefd9a92c83b6c07dad066411fd5a192
affected

74784081aac8a0f3636965fc230e2d3b7cc123c6 before 3dbe5829408bc1586f75b4667ef60e5aab0209c7
affected

Default status
affected

5.12
affected

Any version before 5.12
unaffected

5.15.61
unaffected

5.18.18
unaffected

5.19.2
unaffected

6.0
unaffected

References

git.kernel.org/...c/c71e000db8536d27ec410abb3e314896a78b4f19

git.kernel.org/...c/3811d51778900064d27d8c9a98f73410fb3b471d

git.kernel.org/...c/73fc099eaefd9a92c83b6c07dad066411fd5a192

git.kernel.org/...c/3dbe5829408bc1586f75b4667ef60e5aab0209c7

cve.org (CVE-2022-50225)

nvd.nist.gov (CVE-2022-50225)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-50225

Support options

Helpdesk Chat, Email, Knowledgebase