In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: don't access invalid sched
Since 2320c9e6a768 ("drm/sched: memset() 'job' in drmschedjobinit()") accessing job->base.sched can produce unexpected results as the initialisation of (*job)->base.sched done in amdgpujob_alloc is overwritten by the memset.
This commit fixes an issue when a CS would fail validation and would be rejected after job->numibs is incremented. In this case, amdgpuib_free(ring->adev, ...) will be called, which would crash the machine because the ring value is bogus.
To fix this, pass a NULL pointer to amdgpuibfree(): we can do this because the device is actually not used in this function.
The next commit will remove the ring argument completely.
(cherry picked from commit 2ae520cb12831d264ceb97c61f72c59d33c0dbd7)