CVE-2022-50012

Source
https://cve.org/CVERecord?id=CVE-2022-50012
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50012.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-50012
Downstream
Related
Published
2025-06-18T11:01:16.857Z
Modified
2026-04-03T13:14:50.307082986Z
Summary
powerpc/64: Init jump labels before parse_early_param()
Details

In the Linux kernel, the following vulnerability has been resolved:

powerpc/64: Init jump labels before parseearlyparam()

On 64-bit, calling jumplabelinit() in setupfeaturekeys() is too late because static keys may be used in subroutines of parseearlyparam() which is again subroutine of earlyinitdevtree().

For example booting with "threadirqs":

statickeyenablecpuslocked(): static key '0xc000000002953260' used before call to jumplabelinit() WARNING: CPU: 0 PID: 0 at kernel/jumplabel.c:166 statickeyenablecpuslocked+0xfc/0x120 ... NIP statickeyenablecpuslocked+0xfc/0x120 LR statickeyenablecpuslocked+0xf8/0x120 Call Trace: statickeyenablecpuslocked+0xf8/0x120 (unreliable) statickeyenable+0x30/0x50 setupforcedirqthreads+0x28/0x40 doearlyparam+0xa0/0x108 parseargs+0x290/0x4e0 parseearlyoptions+0x48/0x5c parseearlyparam+0x58/0x84 earlyinitdevtree+0xd4/0x518 earlysetup+0xb4/0x214

So call jumplabelinit() just before parseearlyparam() in earlyinitdevtree().

[mpe: Add call trace to change log and minor wording edits.]

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50012.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
91cc470e797828d779cd4c1efbe8519bcb358bae
Fixed
e3c9e9452a8ea12d335b1e59b2c72e1b99c699b8
Fixed
8f9357313cdcadb0a311b44c29d4eaccc7fa632f
Fixed
ca829e05d3d4f728810cc5e4b468d9ebc7745eb3

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50012.json"