CVE-2022-50844

Source
https://cve.org/CVERecord?id=CVE-2022-50844
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50844.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-50844
Downstream
Related
Published
2025-12-30T12:11:01.928Z
Modified
2026-01-30T02:55:00.026951Z
Summary
drm/amdgpu: Fix type of second parameter in odn_edit_dpm_table() callback
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix type of second parameter in odneditdpm_table() callback

With clang's kernel control flow integrity (kCFI, CONFIGCFICLANG), indirect call targets are validated against the expected function pointer prototype to make sure the call target is valid to help mitigate ROP attacks. If they are not identical, there is a failure at run time, which manifests as either a kernel panic or thread getting killed. A proposed warning in clang aims to catch these at compile time, which reveals:

drivers/gpu/drm/amd/amdgpu/../pm/swsmu/amdgpusmu.c:3008:29: error: incompatible function pointer types initializing 'int (*)(void *, uint32t, long , uint32_t)' (aka 'int ()(void *, unsigned int, long *, unsigned int)') with an expression of type 'int (void *, enum PPODDPMTABLECOMMAND, long *, uint32t)' (aka 'int (void *, enum PPODDPMTABLECOMMAND, long *, unsigned int)') [-Werror,-Wincompatible-function-pointer-types-strict] .odneditdpmtable = smuodeditdpmtable, ^~~~~~~~~~~~~~~~~~~~~ 1 error generated.

There are only two implementations of ->odneditdpmtable() in 'struct amdpmfuncs': smuodeditdpmtable() and ppodneditdpmtable(). One has a second parameter type of 'enum PPODDPMTABLECOMMAND' and the other uses 'u32'. Ultimately, smuodeditdpmtable() calls ->odeditdpmtable() from 'struct pptablefuncs' and ppodneditdpmtable() calls ->odneditdpmtable() from 'struct pphwmgrfunc', which both have a second parameter type of 'enum PPODDPMTABLECOMMAND'.

Update the type parameter in both the prototype in 'struct amdpmfuncs' and ppodneditdpmtable() to 'enum PPODDPMTABLECOMMAND', which cleans up the warning.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50844.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
8f4828d0a104d961d5eb850d0aef1530fc24e370
Fixed
f9084e9930db562bdcd47fa199a66fb45e16dab5
Fixed
24cba9d865157c9e23128fbcf8b86f5da9570edd
Fixed
36217f676b55932a12d6732c95388150015fdee6
Fixed
e4d0ef752081e7aa6ffb7ccac11c499c732a2e05

Affected versions

v5.*

v5.11
v5.11-rc6
v5.11-rc7
v5.12
v5.12-rc1
v5.12-rc1-dontuse
v5.12-rc2
v5.12-rc3
v5.12-rc4
v5.12-rc5
v5.12-rc6
v5.12-rc7
v5.12-rc8
v5.13
v5.13-rc1
v5.13-rc2
v5.13-rc3
v5.13-rc4
v5.13-rc5
v5.13-rc6
v5.13-rc7
v5.14
v5.14-rc1
v5.14-rc2
v5.14-rc3
v5.14-rc4
v5.14-rc5
v5.14-rc6
v5.14-rc7
v5.15
v5.15-rc1
v5.15-rc2
v5.15-rc3
v5.15-rc4
v5.15-rc5
v5.15-rc6
v5.15-rc7
v5.15.1
v5.15.10
v5.15.11
v5.15.12
v5.15.13
v5.15.14
v5.15.15
v5.15.16
v5.15.17
v5.15.18
v5.15.19
v5.15.2
v5.15.20
v5.15.21
v5.15.22
v5.15.23
v5.15.24
v5.15.25
v5.15.26
v5.15.27
v5.15.28
v5.15.29
v5.15.3
v5.15.30
v5.15.31
v5.15.32
v5.15.33
v5.15.34
v5.15.35
v5.15.36
v5.15.37
v5.15.38
v5.15.39
v5.15.4
v5.15.40
v5.15.41
v5.15.42
v5.15.43
v5.15.44
v5.15.45
v5.15.46
v5.15.47
v5.15.48
v5.15.49
v5.15.5
v5.15.50
v5.15.51
v5.15.52
v5.15.53
v5.15.54
v5.15.55
v5.15.56
v5.15.57
v5.15.58
v5.15.59
v5.15.6
v5.15.60
v5.15.61
v5.15.62
v5.15.63
v5.15.64
v5.15.65
v5.15.66
v5.15.67
v5.15.68
v5.15.69
v5.15.7
v5.15.70
v5.15.71
v5.15.72
v5.15.73
v5.15.74
v5.15.75
v5.15.76
v5.15.77
v5.15.78
v5.15.79
v5.15.8
v5.15.80
v5.15.81
v5.15.82
v5.15.83
v5.15.84
v5.15.85
v5.15.9
v5.16
v5.16-rc1
v5.16-rc2
v5.16-rc3
v5.16-rc4
v5.16-rc5
v5.16-rc6
v5.16-rc7
v5.16-rc8
v5.17
v5.17-rc1
v5.17-rc2
v5.17-rc3
v5.17-rc4
v5.17-rc5
v5.17-rc6
v5.17-rc7
v5.17-rc8
v5.18
v5.18-rc1
v5.18-rc2
v5.18-rc3
v5.18-rc4
v5.18-rc5
v5.18-rc6
v5.18-rc7
v5.19
v5.19-rc1
v5.19-rc2
v5.19-rc3
v5.19-rc4
v5.19-rc5
v5.19-rc6
v5.19-rc7
v5.19-rc8

v6.*

v6.0
v6.0-rc1
v6.0-rc2
v6.0-rc3
v6.0-rc4
v6.0-rc5
v6.0-rc6
v6.0-rc7
v6.0.1
v6.0.10
v6.0.11
v6.0.12
v6.0.13
v6.0.14
v6.0.15
v6.0.2
v6.0.3
v6.0.4
v6.0.5
v6.0.6
v6.0.7
v6.0.8
v6.0.9
v6.1
v6.1-rc1
v6.1-rc2
v6.1-rc3
v6.1-rc4
v6.1-rc5
v6.1-rc6
v6.1-rc7
v6.1-rc8
v6.1.1

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50844.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.13.0
Fixed
5.15.86
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.0.16
Type
ECOSYSTEM
Events
Introduced
6.1.0
Fixed
6.1.2

Database specific

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50844.json"