From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 9C7813F0767 for ; Fri, 8 May 2026 14:26:01 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1778250361; cv=none; b=BY5QHKG1GuUM7kpnmPshtP2cgfmPkzs01UmVuRPA5k4chpa6wYWW4SoR7rQydbBnPjAzhbIcbkiUCv3HfsDhZgbKsZUJPtzRPqXhN34zmc2foxiu4ENQQCC9PBaCYIfiSQEjprXMjit5zV51wwxH+LuBnSV3ExuOypdBPDyjKvM= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1778250361; c=relaxed/simple; bh=KMFpKhKfcI5KYaapJ1etdcR2sNr7LZuma5jtEZRJfTw=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=Z9bf4CnZfqTuiAZyJ9PX/WCLPrjv73cK2ueBN6hLuUaNgG+GzvURZcQXsObrnW2K/tf+Nxh5DOFA1zEYNtSZ4Iw8kL5iZGYdIHok0fN8BfXxpT607SKZ3eINY+yeFvvFOnTYlFtYSat3W8rAMXY7tm+TbdZIobjIbLfpSzT6lqQ= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=ZJkRft6z; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="ZJkRft6z" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 33CA2C2BCB0; Fri, 8 May 2026 14:26:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1778250361; bh=KMFpKhKfcI5KYaapJ1etdcR2sNr7LZuma5jtEZRJfTw=; h=From:To:Cc:Subject:Date:Reply-To:From; b=ZJkRft6ziHgPhDLAjnOnYNnge8HoIVVGKw04xwidxq8CTGAzB4uToNBG/umDDQWJd tQ0WNH1DC5kn7C+80mBK//USuaq05eiLHCjxw8batm/K/sZSuJIS7pBPj2quhAMofW ffwcNC/ktFFvqi6lpZF2Lb3yUypYoPwYafBV9CZ8= From: Greg Kroah-Hartman To: linux-cve-announce@vger.kernel.org Cc: Greg Kroah-Hartman Subject: CVE-2026-43446: accel/amdxdna: Fix runtime suspend deadlock when there is pending job Date: Fri, 8 May 2026 16:22:55 +0200 Message-ID: <2026050856-CVE-2026-43446-5b42@gregkh> X-Mailer: git-send-email 2.54.0 Reply-To: , Precedence: bulk X-Mailing-List: linux-cve-announce@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-Developer-Signature: v=1; a=openpgp-sha256; l=2251; i=gregkh@linuxfoundation.org; h=from:subject:message-id; bh=CZ5LjUVZFSiy5RvUKu1NPuucH1Y5jfRqWFLOh6u7088=; b=owGbwMvMwCRo6H6F97bub03G02pJDJl/P7YYmvVZHOTJUs944b5z7XMxtdYeptmXXIyWTb/95 1l/jpJpRywLgyATg6yYIsuXbTxH91ccUvQytD0NM4eVCWQIAxenAEzkiCLDXOnaqZkHm4K0H5fN PmUvWO7KcpXblmHBSt2mTy4FRuVTZL1TN+QX/ei0EbgNAA== X-Developer-Key: i=gregkh@linuxfoundation.org; a=openpgp; fpr=F4B60CC5BF78C2214A313DCB3147D40DDB2DFB29 Content-Transfer-Encoding: 8bit From: Greg Kroah-Hartman Description =========== In the Linux kernel, the following vulnerability has been resolved: accel/amdxdna: Fix runtime suspend deadlock when there is pending job The runtime suspend callback drains the running job workqueue before suspending the device. If a job is still executing and calls pm_runtime_resume_and_get(), it can deadlock with the runtime suspend path. Fix this by moving pm_runtime_resume_and_get() from the job execution routine to the job submission routine, ensuring the device is resumed before the job is queued and avoiding the deadlock during runtime suspend. The Linux kernel CVE team has assigned CVE-2026-43446 to this issue. Affected and fixed versions =========================== Issue introduced in 6.19 with commit 063db451832b8849faf1b0b8404b3a6a39995b29 and fixed in 6.19.9 with commit ac72e7385a2c7533dd766de4197134d96230be85 Issue introduced in 6.19 with commit 063db451832b8849faf1b0b8404b3a6a39995b29 and fixed in 7.0 with commit 6b13cb8f48a42ddf6dd98865b673a82e37ff238b Please see https://www.kernel.org for a full list of currently supported kernel versions by the kernel community. Unaffected versions might change over time as fixes are backported to older supported kernel versions. The official CVE entry at https://cve.org/CVERecord/?id=CVE-2026-43446 will be updated if fixes are backported, please check that for the most up to date information about this issue. Affected files ============== The file(s) affected by this issue are: drivers/accel/amdxdna/aie2_ctx.c drivers/accel/amdxdna/amdxdna_ctx.c Mitigation ========== The Linux kernel CVE team recommends that you update to the latest stable kernel version for this, and many other bugfixes. Individual changes are never tested alone, but rather are part of a larger kernel release. Cherry-picking individual commits is not recommended or supported by the Linux kernel community at all. If however, updating to the latest release is impossible, the individual changes to resolve this issue can be found at these commits: https://git.kernel.org/stable/c/ac72e7385a2c7533dd766de4197134d96230be85 https://git.kernel.org/stable/c/6b13cb8f48a42ddf6dd98865b673a82e37ff238b