Description
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix amdgpu_irq_put call trace in gmc_v10_0_hw_fini The gmc.ecc_irq is enabled by firmware per IFWI setting, and the host driver is not privileged to enable/disable the interrupt. So, it is meaningless to use the amdgpu_irq_put function in gmc_v10_0_hw_fini, which also leads to the call trace. [ 82.340264] Call Trace: [ 82.340265] <TASK> [ 82.340269] gmc_v10_0_hw_fini+0x83/0xa0 [amdgpu] [ 82.340447] gmc_v10_0_suspend+0xe/0x20 [amdgpu] [ 82.340623] amdgpu_device_ip_suspend_phase2+0x127/0x1c0 [amdgpu] [ 82.340789] amdgpu_device_ip_suspend+0x3d/0x80 [amdgpu] [ 82.340955] amdgpu_device_pre_asic_reset+0xdd/0x2b0 [amdgpu] [ 82.341122] amdgpu_device_gpu_recover.cold+0x4dd/0xbb2 [amdgpu] [ 82.341359] amdgpu_debugfs_reset_work+0x4c/0x70 [amdgpu] [ 82.341529] process_one_work+0x21d/0x3f0 [ 82.341535] worker_thread+0x1fa/0x3c0 [ 82.341538] ? process_one_work+0x3f0/0x3f0 [ 82.341540] kthread+0xff/0x130 [ 82.341544] ? kthread_complete_and_exit+0x20/0x20 [ 82.341547] ret_from_fork+0x22/0x30
Product status
bef774effb278ff0b65ea2dbaa1ab32ba6a1dc13 (git) before 59e2439111ac2bd24ea0cecf5825cf06684b2c6c
56a03f64fedf49a4f81c5605167b6e7bb0300a59 (git) before a7e65a1ea871e99115add88ecbcfdbacc2415f07
c8b5a95b570949536a2b75cd8fc4f1de0bc60629 (git) before 23febab57e345c0e66f8574c1018707e7eb6ea94
c8b5a95b570949536a2b75cd8fc4f1de0bc60629 (git) before 08c677cb0b436a96a836792bb35a8ec5de4999c2
6.3
Any version before 6.3
6.1.29 (semver)
6.2.16 (semver)
6.3.3 (semver)
6.4 (original_commit_for_fix)
References
git.kernel.org/...c/59e2439111ac2bd24ea0cecf5825cf06684b2c6c
git.kernel.org/...c/a7e65a1ea871e99115add88ecbcfdbacc2415f07
git.kernel.org/...c/23febab57e345c0e66f8574c1018707e7eb6ea94
git.kernel.org/...c/08c677cb0b436a96a836792bb35a8ec5de4999c2