{"id":"CVE-2023-53471","summary":"drm/amdgpu/gfx: disable gfx9 cp_ecc_error_irq only when enabling legacy gfx ras","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu/gfx: disable gfx9 cp_ecc_error_irq only when enabling legacy gfx ras\n\ngfx9 cp_ecc_error_irq is only enabled when legacy gfx ras is assert.\nSo in gfx_v9_0_hw_fini, interrupt disablement for cp_ecc_error_irq\nshould be executed under such condition, otherwise, an amdgpu_irq_put\ncalltrace will occur.\n\n[ 7283.170322] RIP: 0010:amdgpu_irq_put+0x45/0x70 [amdgpu]\n[ 7283.170964] RSP: 0018:ffff9a5fc3967d00 EFLAGS: 00010246\n[ 7283.170967] RAX: ffff98d88afd3040 RBX: ffff98d89da20000 RCX: 0000000000000000\n[ 7283.170969] RDX: 0000000000000000 RSI: ffff98d89da2bef8 RDI: ffff98d89da20000\n[ 7283.170971] RBP: ffff98d89da20000 R08: ffff98d89da2ca18 R09: 0000000000000006\n[ 7283.170973] R10: ffffd5764243c008 R11: 0000000000000000 R12: 0000000000001050\n[ 7283.170975] R13: ffff98d89da38978 R14: ffffffff999ae15a R15: ffff98d880130105\n[ 7283.170978] FS:  0000000000000000(0000) GS:ffff98d996f00000(0000) knlGS:0000000000000000\n[ 7283.170981] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 7283.170983] CR2: 00000000f7a9d178 CR3: 00000001c42ea000 CR4: 00000000003506e0\n[ 7283.170986] Call Trace:\n[ 7283.170988]  \u003cTASK\u003e\n[ 7283.170989]  gfx_v9_0_hw_fini+0x1c/0x6d0 [amdgpu]\n[ 7283.171655]  amdgpu_device_ip_suspend_phase2+0x101/0x1a0 [amdgpu]\n[ 7283.172245]  amdgpu_device_suspend+0x103/0x180 [amdgpu]\n[ 7283.172823]  amdgpu_pmops_freeze+0x21/0x60 [amdgpu]\n[ 7283.173412]  pci_pm_freeze+0x54/0xc0\n[ 7283.173419]  ? __pfx_pci_pm_freeze+0x10/0x10\n[ 7283.173425]  dpm_run_callback+0x98/0x200\n[ 7283.173430]  __device_suspend+0x164/0x5f0\n\nv2: drop gfx11 as it's fixed in a different solution by retiring cp_ecc_irq funcs(Hawking)","modified":"2026-04-02T09:44:16.617238Z","published":"2025-10-01T11:42:41.046Z","related":["SUSE-SU-2025:03615-1","SUSE-SU-2025:03628-1","SUSE-SU-2025:3716-1","SUSE-SU-2025:3761-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53471.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/20ca90ceda71ed90a4d6960acbe7d5e120b40c0d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3d28af21a874c5123d1681c2d686627f7ff7e488"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4a76680311330aefe5074bed8f06afa354b85c48"},{"type":"WEB","url":"https://git.kernel.org/stable/c/625d4112ea25dbad7ddf749fd5c1287ceffb2339"},{"type":"WEB","url":"https://git.kernel.org/stable/c/cd3c0f7013c37cd24fc40b601319007f136c1201"},{"type":"WEB","url":"https://git.kernel.org/stable/c/efce310db74fdc6d2acd959f3582972ae4a8d7d5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f661ad53658a1ea35c004af1f5fbe25c4d1cdb08"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53471.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53471"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"d38ceaf99ed015f2a0b9af3499791bd3a3daae21"},{"fixed":"625d4112ea25dbad7ddf749fd5c1287ceffb2339"},{"fixed":"20ca90ceda71ed90a4d6960acbe7d5e120b40c0d"},{"fixed":"cd3c0f7013c37cd24fc40b601319007f136c1201"},{"fixed":"f661ad53658a1ea35c004af1f5fbe25c4d1cdb08"},{"fixed":"3d28af21a874c5123d1681c2d686627f7ff7e488"},{"fixed":"efce310db74fdc6d2acd959f3582972ae4a8d7d5"},{"fixed":"4a76680311330aefe5074bed8f06afa354b85c48"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53471.json"}}],"schema_version":"1.7.5"}