CVE-2025-68203

Source
https://cve.org/CVERecord?id=CVE-2025-68203
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68203.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-68203
Downstream
Published
2025-12-16T13:48:31.102Z
Modified
2026-04-10T05:35:01.433496Z
Summary
drm/amdgpu: fix lock warning in amdgpu_userq_fence_driver_process
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix lock warning in amdgpuuserqfencedriverprocess

Fix a potential deadlock caused by inconsistent spinlock usage between interrupt and process contexts in the userq fence driver.

The issue occurs when amdgpuuserqfencedriverprocess() is called from both: - Interrupt context: gfxv110eopirq() -> amdgpuuserqfencedriverprocess() - Process context: amdgpuevictionfencesuspendworker() -> amdgpuuserqfencedriverforcecompletion() -> amdgpuuserqfencedriver_process()

In interrupt context, the spinlock was acquired without disabling interrupts, leaving it in {IN-HARDIRQ-W} state. When the same lock is acquired in process context, the kernel detects inconsistent locking since the process context acquisition would enable interrupts while holding a lock previously acquired in interrupt context.

Kernel log shows: [ 4039.310790] inconsistent {IN-HARDIRQ-W} -> {HARDIRQ-ON-W} usage. [ 4039.310818] ffff9284e1bed000 (&fencedrv->fencelistlock){?...}-{3:3}, [ 4039.310993] {IN-HARDIRQ-W} state was registered at: [ 4039.311004] lockacquire+0xc6/0x300 [ 4039.311018] rawspinlock+0x39/0x80 [ 4039.311031] amdgpuuserqfencedriverprocess.part.0+0x30/0x180 [amdgpu] [ 4039.311146] amdgpuuserqfencedriverprocess+0x17/0x30 [amdgpu] [ 4039.311257] gfxv110eop_irq+0x132/0x170 [amdgpu]

Fix by using spinlockirqsave()/spinunlockirqrestore() to properly manage interrupt state regardless of calling context.

(cherry picked from commit ded3ad780cf97a04927773c4600823b84f7f3cc2)

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/68xxx/CVE-2025-68203.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed
1ad70a06d7e91c378b346a3718c81abb50a74b74
Fixed
6623c5f9fd877868fba133b4ae4dab0052e82dad

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68203.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.17.9

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-68203.json"