In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: fix amdgpuirqput call trace in gmcv110hwfini
The gmc.eccirq is enabled by firmware per IFWI setting, and the host driver is not privileged to enable/disable the interrupt. So, it is meaningless to use the amdgpuirqput function in gmcv110hw_fini, which also leads to the call trace.
[ 102.980303] Call Trace: [ 102.980303] <TASK> [ 102.980304] gmcv110hwfini+0x54/0x90 [amdgpu] [ 102.980357] gmcv110suspend+0xe/0x20 [amdgpu] [ 102.980409] amdgpudeviceipsuspendphase2+0x240/0x460 [amdgpu] [ 102.980459] amdgpudeviceipsuspend+0x3d/0x80 [amdgpu] [ 102.980520] amdgpudevicepreasicreset+0xd9/0x490 [amdgpu] [ 102.980573] amdgpudevicegpurecover.cold+0x548/0xce6 [amdgpu] [ 102.980687] amdgpudebugfsresetwork+0x4c/0x70 [amdgpu] [ 102.980740] processonework+0x21f/0x3f0 [ 102.980741] workerthread+0x200/0x3e0 [ 102.980742] ? processonework+0x3f0/0x3f0 [ 102.980743] kthread+0xfd/0x130 [ 102.980743] ? kthreadcompleteandexit+0x20/0x20 [ 102.980744] retfromfork+0x22/0x30
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53237.json"
}