In the Linux kernel, the following vulnerability has been resolved:[EOL][EOL]EDAC/i10nm: Skip DIMM enumeration on a disabled memory controller[EOL][EOL]When loading the i10nm_edac driver on some Intel Granite Rapids servers,[EOL]a call trace may appear as follows:[EOL][EOL] UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16[EOL] shift exponent -66 is negative[EOL] ...[EOL] __ubsan_handle_shift_out_of_bounds+0x1e3/0x390[EOL] skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common][EOL] i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac][EOL] skx_register_mci+0x159/0x220 [skx_edac_common][EOL] i10nm_init+0xcb0/0x1ff0 [i10nm_edac][EOL] ...[EOL][EOL]This occurs because some BIOS may disable a memory controller if there[EOL]aren't any memory DIMMs populated on this memory controller. The DIMMMTR[EOL]register of this disabled memory controller contains the invalid value[EOL]~0, resulting in the call trace above.[EOL][EOL]Fix this call trace by skipping DIMM enumeration on a disabled memory[EOL]controller.