We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-52981

drm/i915: Fix request ref counting during error capture & debugfs dump



Description

In the Linux kernel, the following vulnerability has been resolved: drm/i915: Fix request ref counting during error capture & debugfs dump When GuC support was added to error capture, the reference counting around the request object was broken. Fix it up. The context based search manages the spinlocking around the search internally. So it needs to grab the reference count internally as well. The execlist only request based search relies on external locking, so it needs an external reference count but within the spinlock not outside it. The only other caller of the context based search is the code for dumping engine state to debugfs. That code wasn't previously getting an explicit reference at all as it does everything while holding the execlist specific spinlock. So, that needs updaing as well as that spinlock doesn't help when using GuC submission. Rather than trying to conditionally get/put depending on submission model, just change it to always do the get/put. v2: Explicitly document adding an extra blank line in some dense code (Andy Shevchenko). Fix multiple potential null pointer derefs in case of no request found (some spotted by Tvrtko, but there was more!). Also fix a leaked request in case of !started and another in __guc_reset_context now that intel_context_find_active_request is actually reference counting the returned request. v3: Add a _get suffix to intel_context_find_active_request now that it grabs a reference (Daniele). v4: Split the intel_guc_find_hung_context change to a separate patch and rename intel_context_find_active_request_get to intel_context_get_active_request (Tvrtko). v5: s/locking/reference counting/ in commit message (Tvrtko) (cherry picked from commit 3700e353781e27f1bc7222f51f2cc36cbeb9b4ec)

Reserved 2025-03-27 | Published 2025-03-27 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

573ba126aef37c8315e5bb68d2dad515efa96994 before 9467397f417dd7b5d0db91452f0474e79716a527
affected

573ba126aef37c8315e5bb68d2dad515efa96994 before 86d8ddc74124c3fdfc139f246ba6da15e45e86e3
affected

Default status
affected

5.15
affected

Any version before 5.15
unaffected

6.1.11
unaffected

6.2
unaffected

References

git.kernel.org/...c/9467397f417dd7b5d0db91452f0474e79716a527

git.kernel.org/...c/86d8ddc74124c3fdfc139f246ba6da15e45e86e3

cve.org (CVE-2023-52981)

nvd.nist.gov (CVE-2023-52981)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2023-52981

Support options

Helpdesk Chat, Email, Knowledgebase