In the Linux kernel, the following vulnerability has been resolved:
drm/i915/gt: Reset queue_priority_hint on parking Originally, with strict
in order execution, we could complete execution only when the queue was
empty. Preempt-to-busy allows replacement of an active request that may
complete before the preemption is processed by HW. If that happens, the
request is retired from the queue, but the queue_priority_hint remains set,
preventing direct submission until after the next CS interrupt is
processed. This preempt-to-busy race can be triggered by the heartbeat,
which will also act as the power-management barrier and upon completion
allow us to idle the HW. We may process the completion of the heartbeat,
and begin parking the engine before the CS event that restores the
queue_priority_hint, causing us to fail the assertion that it is MIN. <3>[
166.210729] __engine_park:283
GEM_BUG_ON(engine->sched_engine->queue_priority_hint != (-((int)(~0U >> 1))
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < 6.8.0-35.35 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux-aws | < 6.8.0-1009.9 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws-5.15 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws-6.5 | < any | UNKNOWN |
git.kernel.org/linus/4a3859ea5240365d21f6053ee219bb240d520895 (6.9-rc2)
git.kernel.org/stable/c/3b031e4fcb2740988143c303f81f69f18ce86325
git.kernel.org/stable/c/4a3859ea5240365d21f6053ee219bb240d520895
git.kernel.org/stable/c/67944e6db656bf1e986aa2a359f866f851091f8a
git.kernel.org/stable/c/7eab7b021835ae422c38b968d5cc60e99408fb62
git.kernel.org/stable/c/8fd9b0ce8c26533fe4d5d15ea15bbf7b904b611c
git.kernel.org/stable/c/ac9b6b3e8d1237136c8ebf0fa1ce037dd7e2948f
git.kernel.org/stable/c/aed034866a08bb7e6e34d50a5629a4d23fe83703
git.kernel.org/stable/c/fe34587acc995e7b1d7a5d3444a0736721ec32b3
launchpad.net/bugs/cve/CVE-2024-26937
nvd.nist.gov/vuln/detail/CVE-2024-26937
security-tracker.debian.org/tracker/CVE-2024-26937
ubuntu.com/security/notices/USN-6816-1
ubuntu.com/security/notices/USN-6817-1
ubuntu.com/security/notices/USN-6817-2
ubuntu.com/security/notices/USN-6817-3
ubuntu.com/security/notices/USN-6878-1
www.cve.org/CVERecord?id=CVE-2024-26937