From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Vulnerability Description: - Title: - Description: During the unload of the amdgpu module, a double free issue may occur. This is because flexible endpoints use DIGs (from available non-flexible endpoints), so only the encoders associated with non-flexible links need to be freed. If these encoders are not properly released, a double free issue may occur when unloading the amdgpu module. 2. Code Changes: - File: - Changes: - Removed the check for and replaced it with a check for . - Updated the link encoder resource tracking variables, which are used for dynamically assigning link encoders to streams. Virtual links do not allocate encoder resources at creation time. 3. Author and Reviewers: - Author: Tim Huang - Reviewers: Rodrigo Siqueira, Roman Li, Daniel Wheeler, Alex Deucher, Sasha Levin 4. Sign-off: - Sign-off: Tim Huang, Roman Li 5. Tester: - Tester: Daniel Wheeler 6. Diffstat: - File: - Change Type: 1 insertion, 1 deletion 7. Diff Content: - Removed the check for and replaced it with a check for . - Updated the link encoder resource tracking variables to support dynamic assignment of link encoders to streams. This information indicates that the vulnerability fix addresses a double free issue that could occur during the unload of the amdgpu module, by updating the link encoder resource tracking variables to ensure proper resource management.