In the Linux kernel, the following vulnerability has been resolved:
drm/amdkfd: Fix kernel warning during topology setup
This patch fixes the following kernel warning seen during driver load by correctly initializing the p2plink attr before creating the sysfs file:
[ +0.002865] ------------[ cut here ]------------ [ +0.002327] kobject: '(null)' (0000000056260cfb): is not initialized, yet kobjectput() is being called. [ +0.004780] WARNING: CPU: 32 PID: 1006 at lib/kobject.c:718 kobjectput+0xaa/0x1c0 [ +0.001361] Call Trace: [ +0.001234] <TASK> [ +0.001067] kfdremovesysfsnodeentry+0x24a/0x2d0 [amdgpu] [ +0.003147] kfdtopologyupdatesysfs+0x3d/0x750 [amdgpu] [ +0.002890] kfdtopologyadddevice+0xbd7/0xc70 [amdgpu] [ +0.002844] ? lockrelease+0x13c/0x2e0 [ +0.001936] ? smucmnsendsmcmsgwithparam+0x1e8/0x2d0 [amdgpu] [ +0.003313] ? amdgpudpmgetmclk+0x54/0x60 [amdgpu] [ +0.002703] kgd2kfddeviceinit.cold+0x39f/0x4ed [amdgpu] [ +0.002930] amdgpuamdkfddeviceinit+0x13d/0x1f0 [amdgpu] [ +0.002944] amdgpudeviceinit.cold+0x1464/0x17b4 [amdgpu] [ +0.002970] ? pcibusreadconfigword+0x43/0x80 [ +0.002380] amdgpudriverloadkms+0x15/0x100 [amdgpu] [ +0.002744] amdgpupciprobe+0x147/0x370 [amdgpu] [ +0.002522] localpciprobe+0x40/0x80 [ +0.001896] workforcpufn+0x10/0x20 [ +0.001892] processonework+0x26e/0x5a0 [ +0.002029] workerthread+0x1fd/0x3e0 [ +0.001890] ? processonework+0x5a0/0x5a0 [ +0.002115] kthread+0xea/0x110 [ +0.001618] ? kthreadcompleteandexit+0x20/0x20 [ +0.002422] retfromfork+0x1f/0x30 [ +0.001808] </TASK> [ +0.001103] irq event stamp: 59837 [ +0.001718] hardirqs last enabled at (59849): [<ffffffffb30fab12>] _upconsolesem+0x52/0x60 [ +0.004414] hardirqs last disabled at (59860): [<ffffffffb30faaf7>] _upconsolesem+0x37/0x60 [ +0.004414] softirqs last enabled at (59654): [<ffffffffb307d9c7>] irqexitrcu+0xd7/0x130 [ +0.004205] softirqs last disabled at (59649): [<ffffffffb307d9c7>] irqexit_rcu+0xd7/0x130 [ +0.004203] ---[ end trace 0000000000000000 ]---
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54144.json",
"cna_assigner": "Linux"
}