In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: range check cp bad op exception interrupts Due to a CP interrupt bug, bad packet garbage exception codes are raised. Do a range check so that the debugger and runtime do not receive garbage codes. Update the user api to guard exception code type checking as well.
https://git.kernel.org/stable/c/b6735bfe941486c5dfc9c3085d2d75d4923f9449
https://git.kernel.org/stable/c/41dc6791596656dd41100b85647ed489e1d5c2f2
https://git.kernel.org/stable/c/0cac183b98d8a8c692c98e8dba37df15a9e9210d