Description
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix ttm_bo calltrace warning in psp_hw_fini The call trace occurs when the amdgpu is removed after the mode1 reset. During mode1 reset, from suspend to resume, there is no need to reinitialize the ta firmware buffer which caused the bo pin_count increase redundantly. [ 489.885525] Call Trace: [ 489.885525] <TASK> [ 489.885526] amdttm_bo_put+0x34/0x50 [amdttm] [ 489.885529] amdgpu_bo_free_kernel+0xe8/0x130 [amdgpu] [ 489.885620] psp_free_shared_bufs+0xb7/0x150 [amdgpu] [ 489.885720] psp_hw_fini+0xce/0x170 [amdgpu] [ 489.885815] amdgpu_device_fini_hw+0x2ff/0x413 [amdgpu] [ 489.885960] ? blocking_notifier_chain_unregister+0x56/0xb0 [ 489.885962] amdgpu_driver_unload_kms+0x51/0x60 [amdgpu] [ 489.886049] amdgpu_pci_remove+0x5a/0x140 [amdgpu] [ 489.886132] ? __pm_runtime_resume+0x60/0x90 [ 489.886134] pci_device_remove+0x3e/0xb0 [ 489.886135] __device_release_driver+0x1ab/0x2a0 [ 489.886137] driver_detach+0xf3/0x140 [ 489.886138] bus_remove_driver+0x6c/0xf0 [ 489.886140] driver_unregister+0x31/0x60 [ 489.886141] pci_unregister_driver+0x40/0x90 [ 489.886142] amdgpu_exit+0x15/0x451 [amdgpu]
Product status
0e5ca0d1ac07ef8b3a52d3b0404482207cb4da5a (git) before 7be9a2f8c5179520a7d5570e648e0c97d09e4fae
0e5ca0d1ac07ef8b3a52d3b0404482207cb4da5a (git) before 55a7c647ebf6e376c45d8322568dd6eb71937139
0e5ca0d1ac07ef8b3a52d3b0404482207cb4da5a (git) before 23f4a2d29ba57bf88095f817de5809d427fcbe7e
4.12
Any version before 4.12
6.1.21 (semver)
6.2.8 (semver)
6.3 (original_commit_for_fix)
References
git.kernel.org/...c/7be9a2f8c5179520a7d5570e648e0c97d09e4fae
git.kernel.org/...c/55a7c647ebf6e376c45d8322568dd6eb71937139
git.kernel.org/...c/23f4a2d29ba57bf88095f817de5809d427fcbe7e
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.