CVE-2022-50371

Source
https://cve.org/CVERecord?id=CVE-2022-50371
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50371.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50371
Downstream
Published
2025-09-17T14:56:26.854Z
Modified
2026-03-12T03:26:26.643964Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
led: qcom-lpg: Fix sleeping in atomic
Details

In the Linux kernel, the following vulnerability has been resolved:

led: qcom-lpg: Fix sleeping in atomic

lpgbrighnessset() function can sleep, while led's brightnessset() callback must be non-blocking. Change LPG driver to use brightnessset_blocking() instead.

BUG: sleeping function called from invalid context at kernel/locking/mutex.c:580 inatomic(): 1, irqsdisabled(): 0, nonblock: 0, pid: 0, name: swapper/0 preemptcount: 101, expected: 0 INFO: lockdep is turned off. CPU: 0 PID: 0 Comm: swapper/0 Tainted: G W 6.1.0-rc1-00014-gbe99b089c6fc-dirty #85 Hardware name: Qualcomm Technologies, Inc. DB820c (DT) Call trace: dumpbacktrace.part.0+0xe4/0xf0 showstack+0x18/0x40 dumpstacklvl+0x88/0xb4 dump_stack+0x18/0x34 __might_resched+0x170/0x254 __might_sleep+0x48/0x9c __mutexlock+0x4c/0x400 mutexlocknested+0x2c/0x40 lpgbrightnesssingleset+0x40/0x90 ledsetbrightnessnosleep+0x34/0x60 ledheartbeatfunction+0x80/0x170 calltimer_fn+0xb8/0x340 __runtimers.part.0+0x20c/0x254 runtimer_softirq+0x3c/0x7c _stext+0x14c/0x578 ____dosoftirq+0x10/0x20 callonirqstack+0x2c/0x5c do_softirqownstack+0x1c/0x30 __irqexitrcu+0x164/0x170 irqexitrcu+0x10/0x40 el1interrupt+0x38/0x50 el1h64irqhandler+0x18/0x2c el1h64irq+0x64/0x68 cpuidleenterstate+0xc8/0x380 cpuidleenter+0x38/0x50 doidle+0x244/0x2d0 cpustartupentry+0x24/0x30 restinit+0x128/0x1a0 archpostacpisubsysinit+0x0/0x18 startkernel+0x6f4/0x734 _primaryswitched+0xbc/0xc4

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50371.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
24e2d05d1b68981f22c984c766fabc5a93c83dba
Fixed
9deba7b51d5ee7a2d93fabb69f9b8189241f90e3
Fixed
380304391fa7fb084745f26b4b9a59f4666520c1
Fixed
3031993b3474794ecb71b6f969a3e60e4bda9d8a

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50371.json"