CVE-2022-48704
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
03/05/2024
Last modified:
19/09/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drm/radeon: add a force flush to delay work when radeon<br />
<br />
Although radeon card fence and wait for gpu to finish processing current batch rings,<br />
there is still a corner case that radeon lockup work queue may not be fully flushed,<br />
and meanwhile the radeon_suspend_kms() function has called pci_set_power_state() to<br />
put device in D3hot state.<br />
Per PCI spec rev 4.0 on 5.3.1.4.1 D3hot State.<br />
> Configuration and Message requests are the only TLPs accepted by a Function in<br />
> the D3hot state. All other received Requests must be handled as Unsupported Requests,<br />
> and all received Completions may optionally be handled as Unexpected Completions.<br />
This issue will happen in following logs:<br />
Unable to handle kernel paging request at virtual address 00008800e0008010<br />
CPU 0 kworker/0:3(131): Oops 0<br />
pc = [] ra = [] ps = 0000 Tainted: G W<br />
pc is at si_gpu_check_soft_reset+0x3c/0x240<br />
ra is at si_dma_is_lockup+0x34/0xd0<br />
v0 = 0000000000000000 t0 = fff08800e0008010 t1 = 0000000000010000<br />
t2 = 0000000000008010 t3 = fff00007e3c00000 t4 = fff00007e3c00258<br />
t5 = 000000000000ffff t6 = 0000000000000001 t7 = fff00007ef078000<br />
s0 = fff00007e3c016e8 s1 = fff00007e3c00000 s2 = fff00007e3c00018<br />
s3 = fff00007e3c00000 s4 = fff00007fff59d80 s5 = 0000000000000000<br />
s6 = fff00007ef07bd98<br />
a0 = fff00007e3c00000 a1 = fff00007e3c016e8 a2 = 0000000000000008<br />
a3 = 0000000000000001 a4 = 8f5c28f5c28f5c29 a5 = ffffffff810f4338<br />
t8 = 0000000000000275 t9 = ffffffff809b66f8 t10 = ff6769c5d964b800<br />
t11= 000000000000b886 pv = ffffffff811bea20 at = 0000000000000000<br />
gp = ffffffff81d89690 sp = 00000000aa814126<br />
Disabling lock debugging due to kernel taint<br />
Trace:<br />
[] si_dma_is_lockup+0x34/0xd0<br />
[] radeon_fence_check_lockup+0xd0/0x290<br />
[] process_one_work+0x280/0x550<br />
[] worker_thread+0x70/0x7c0<br />
[] worker_thread+0x130/0x7c0<br />
[] kthread+0x200/0x210<br />
[] worker_thread+0x0/0x7c0<br />
[] kthread+0x14c/0x210<br />
[] ret_from_kernel_thread+0x18/0x20<br />
[] kthread+0x0/0x210<br />
Code: ad3e0008 43f0074a ad7e0018 ad9e0020 8c3001e8 40230101<br />
4821ed21<br />
So force lockup work queue flush to fix this problem.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.9.328 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.10 (including) | 4.14.293 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.15 (including) | 4.19.258 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.20 (including) | 5.4.213 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.143 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.68 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 5.19.9 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/16cb367daa446923d82e332537f446a4cc784b40
- https://git.kernel.org/stable/c/4e25e8f27fdbdc6fd55cc572a9939bf24500b9e8
- https://git.kernel.org/stable/c/5a7a5b2edac4b05abd744eeaebda46d9dacd952d
- https://git.kernel.org/stable/c/826b46fd5974113515abe9e4fc8178009a8ce18c
- https://git.kernel.org/stable/c/b878da58df2c40b08914d3960e2224040fd1fbfe
- https://git.kernel.org/stable/c/c0a45f41fde4a0f2c900f719817493ee5c4a5aa3
- https://git.kernel.org/stable/c/c72d97146fc5a4dff381b1737f6167e89860430d
- https://git.kernel.org/stable/c/f461950fdc374a3ada5a63c669d997de4600dffe
- https://git.kernel.org/stable/c/16cb367daa446923d82e332537f446a4cc784b40
- https://git.kernel.org/stable/c/4e25e8f27fdbdc6fd55cc572a9939bf24500b9e8
- https://git.kernel.org/stable/c/5a7a5b2edac4b05abd744eeaebda46d9dacd952d
- https://git.kernel.org/stable/c/826b46fd5974113515abe9e4fc8178009a8ce18c
- https://git.kernel.org/stable/c/b878da58df2c40b08914d3960e2224040fd1fbfe
- https://git.kernel.org/stable/c/c0a45f41fde4a0f2c900f719817493ee5c4a5aa3
- https://git.kernel.org/stable/c/c72d97146fc5a4dff381b1737f6167e89860430d
- https://git.kernel.org/stable/c/f461950fdc374a3ada5a63c669d997de4600dffe



