{"id":"CVE-2022-50430","summary":"mmc: vub300: fix warning - do not call blocking ops when !TASK_RUNNING","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: vub300: fix warning - do not call blocking ops when !TASK_RUNNING\n\nvub300_enable_sdio_irq() works with mutex and need TASK_RUNNING here.\nEnsure that we mark current as TASK_RUNNING for sleepable context.\n\n[   77.554641] do not call blocking ops when !TASK_RUNNING; state=1 set at [\u003cffffffff92a72c1d\u003e] sdio_irq_thread+0x17d/0x5b0\n[   77.554652] WARNING: CPU: 2 PID: 1983 at kernel/sched/core.c:9813 __might_sleep+0x116/0x160\n[   77.554905] CPU: 2 PID: 1983 Comm: ksdioirqd/mmc1 Tainted: G           OE      6.1.0-rc5 #1\n[   77.554910] Hardware name: Intel(R) Client Systems NUC8i7BEH/NUC8BEB, BIOS BECFL357.86A.0081.2020.0504.1834 05/04/2020\n[   77.554912] RIP: 0010:__might_sleep+0x116/0x160\n[   77.554920] RSP: 0018:ffff888107b7fdb8 EFLAGS: 00010282\n[   77.554923] RAX: 0000000000000000 RBX: ffff888118c1b740 RCX: 0000000000000000\n[   77.554926] RDX: 0000000000000001 RSI: 0000000000000004 RDI: ffffed1020f6ffa9\n[   77.554928] RBP: ffff888107b7fde0 R08: 0000000000000001 R09: ffffed1043ea60ba\n[   77.554930] R10: ffff88821f5305cb R11: ffffed1043ea60b9 R12: ffffffff93aa3a60\n[   77.554932] R13: 000000000000011b R14: 7fffffffffffffff R15: ffffffffc0558660\n[   77.554934] FS:  0000000000000000(0000) GS:ffff88821f500000(0000) knlGS:0000000000000000\n[   77.554937] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[   77.554939] CR2: 00007f8a44010d68 CR3: 000000024421a003 CR4: 00000000003706e0\n[   77.554942] Call Trace:\n[   77.554944]  \u003cTASK\u003e\n[   77.554952]  mutex_lock+0x78/0xf0\n[   77.554973]  vub300_enable_sdio_irq+0x103/0x3c0 [vub300]\n[   77.554981]  sdio_irq_thread+0x25c/0x5b0\n[   77.555006]  kthread+0x2b8/0x370\n[   77.555017]  ret_from_fork+0x1f/0x30\n[   77.555023]  \u003c/TASK\u003e\n[   77.555025] ---[ end trace 0000000000000000 ]---","modified":"2026-04-02T08:28:30.647641Z","published":"2025-10-01T11:42:08.708Z","related":["SUSE-SU-2025:03615-1","SUSE-SU-2025:03628-1","SUSE-SU-2025:3716-1","SUSE-SU-2025:3761-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50430.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/32d5af247d4de6a35769ca1d027480a37c28fd0c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/48e91ae755f027d817ed7e51db9963ddb7081946"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4a44cd249604e29e7b90ae796d7692f5773dd348"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6f7258c6f66692b3760c37ddd4bc9e02bb290da7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b51d5fed9f53e07ce9fc65efb4ff1abe021a4c16"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ba2e7d07dd06e646a72ba906a89fdc1cca7ea560"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d15946ef98f4ccdca961b76f90d9b53c454d590e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d58289fc77f8c1f879c818bddaf7ef524c73658b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f1c08947ab0538b07a0bd9d6edadfb5185f56344"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50430.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50430"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"88095e7b473a3d9ec3b9c60429576e9cbd327c89"},{"fixed":"32d5af247d4de6a35769ca1d027480a37c28fd0c"},{"fixed":"48e91ae755f027d817ed7e51db9963ddb7081946"},{"fixed":"6f7258c6f66692b3760c37ddd4bc9e02bb290da7"},{"fixed":"f1c08947ab0538b07a0bd9d6edadfb5185f56344"},{"fixed":"b51d5fed9f53e07ce9fc65efb4ff1abe021a4c16"},{"fixed":"d58289fc77f8c1f879c818bddaf7ef524c73658b"},{"fixed":"d15946ef98f4ccdca961b76f90d9b53c454d590e"},{"fixed":"ba2e7d07dd06e646a72ba906a89fdc1cca7ea560"},{"fixed":"4a44cd249604e29e7b90ae796d7692f5773dd348"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50430.json"}}],"schema_version":"1.7.5"}