In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix amdgpuirqput call trace in gmcv100hwfini The gmc.eccirq is enabled by firmware per IFWI setting, and the host driver is not privileged to enable/disable the interrupt. So, it is meaningless to use the amdgpuirqput function in gmcv100hwfini, which also leads to the call trace. [ 82.340264] Call Trace: [ 82.340265] <TASK> [ 82.340269] gmcv100hwfini+0x83/0xa0 [amdgpu] [ 82.340447] gmcv100suspend+0xe/0x20 [amdgpu] [ 82.340623] amdgpudeviceipsuspendphase2+0x127/0x1c0 [amdgpu] [ 82.340789] amdgpudeviceipsuspend+0x3d/0x80 [amdgpu] [ 82.340955] amdgpudevicepreasicreset+0xdd/0x2b0 [amdgpu] [ 82.341122] amdgpudevicegpurecover.cold+0x4dd/0xbb2 [amdgpu] [ 82.341359] amdgpudebugfsresetwork+0x4c/0x70 [amdgpu] [ 82.341529] processonework+0x21d/0x3f0 [ 82.341535] workerthread+0x1fa/0x3c0 [ 82.341538] ? processonework+0x3f0/0x3f0 [ 82.341540] kthread+0xff/0x130 [ 82.341544] ? kthreadcompleteandexit+0x20/0x20 [ 82.341547] retfrom_fork+0x22/0x30