CVE-2026-23213
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
18/02/2026
Última modificación:
18/02/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drm/amd/pm: Disable MMIO access during SMU Mode 1 reset<br />
<br />
During Mode 1 reset, the ASIC undergoes a reset cycle and becomes<br />
temporarily inaccessible via PCIe. Any attempt to access MMIO registers<br />
during this window (e.g., from interrupt handlers or other driver threads)<br />
can result in uncompleted PCIe transactions, leading to NMI panics or<br />
system hangs.<br />
<br />
To prevent this, set the `no_hw_access` flag to true immediately after<br />
triggering the reset. This signals other driver components to skip<br />
register accesses while the device is offline.<br />
<br />
A memory barrier `smp_mb()` is added to ensure the flag update is<br />
globally visible to all cores before the driver enters the sleep/wait<br />
state.<br />
<br />
(cherry picked from commit 7edb503fe4b6d67f47d8bb0dfafb8e699bb0f8a4)



