[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025070342-CVE-2025-38170-0f47@gregkh>
Date: Thu, 3 Jul 2025 10:36:26 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2025-38170: arm64/fpsimd: Discard stale CPU state when handling SME traps
From: Greg Kroah-Hartman <gregkh@...nel.org>
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
arm64/fpsimd: Discard stale CPU state when handling SME traps
The logic for handling SME traps manipulates saved FPSIMD/SVE/SME state
incorrectly, and a race with preemption can result in a task having
TIF_SME set and TIF_FOREIGN_FPSTATE clear even though the live CPU state
is stale (e.g. with SME traps enabled). This can result in warnings from
do_sme_acc() where SME traps are not expected while TIF_SME is set:
| /* With TIF_SME userspace shouldn't generate any traps */
| if (test_and_set_thread_flag(TIF_SME))
| WARN_ON(1);
This is very similar to the SVE issue we fixed in commit:
751ecf6afd6568ad ("arm64/sve: Discard stale CPU state when handling SVE traps")
The race can occur when the SME trap handler is preempted before and
after manipulating the saved FPSIMD/SVE/SME state, starting and ending on
the same CPU, e.g.
| void do_sme_acc(unsigned long esr, struct pt_regs *regs)
| {
| // Trap on CPU 0 with TIF_SME clear, SME traps enabled
| // task->fpsimd_cpu is 0.
| // per_cpu_ptr(&fpsimd_last_state, 0) is task.
|
| ...
|
| // Preempted; migrated from CPU 0 to CPU 1.
| // TIF_FOREIGN_FPSTATE is set.
|
| get_cpu_fpsimd_context();
|
| /* With TIF_SME userspace shouldn't generate any traps */
| if (test_and_set_thread_flag(TIF_SME))
| WARN_ON(1);
|
| if (!test_thread_flag(TIF_FOREIGN_FPSTATE)) {
| unsigned long vq_minus_one =
| sve_vq_from_vl(task_get_sme_vl(current)) - 1;
| sme_set_vq(vq_minus_one);
|
| fpsimd_bind_task_to_cpu();
| }
|
| put_cpu_fpsimd_context();
|
| // Preempted; migrated from CPU 1 to CPU 0.
| // task->fpsimd_cpu is still 0
| // If per_cpu_ptr(&fpsimd_last_state, 0) is still task then:
| // - Stale HW state is reused (with SME traps enabled)
| // - TIF_FOREIGN_FPSTATE is cleared
| // - A return to userspace skips HW state restore
| }
Fix the case where the state is not live and TIF_FOREIGN_FPSTATE is set
by calling fpsimd_flush_task_state() to detach from the saved CPU
state. This ensures that a subsequent context switch will not reuse the
stale CPU state, and will instead set TIF_FOREIGN_FPSTATE, forcing the
new state to be reloaded from memory prior to a return to userspace.
Note: this was originallly posted as [1].
[ Rutland: rewrite commit message ]
The Linux kernel CVE team has assigned CVE-2025-38170 to this issue.
Affected and fixed versions
===========================
Issue introduced in 5.19 with commit 8bd7f91c03d886f41d35f6108078d20be5a4a1bd and fixed in 6.1.142 with commit de89368de3894a8db27caeb8fd902ba1c49f696a
Issue introduced in 5.19 with commit 8bd7f91c03d886f41d35f6108078d20be5a4a1bd and fixed in 6.6.94 with commit 43be952e885476dafb74aa832c0847b2f4f650c6
Issue introduced in 5.19 with commit 8bd7f91c03d886f41d35f6108078d20be5a4a1bd and fixed in 6.12.34 with commit 6103f9ba51a59afb5a0f32299c837377c5a5a693
Issue introduced in 5.19 with commit 8bd7f91c03d886f41d35f6108078d20be5a4a1bd and fixed in 6.15.3 with commit c4a4786d93e99517d6f10ed56b9ffba4ce88d3b3
Issue introduced in 5.19 with commit 8bd7f91c03d886f41d35f6108078d20be5a4a1bd and fixed in 6.16-rc1 with commit d3eaab3c70905c5467e5c4ea403053d67505adeb
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2025-38170
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
arch/arm64/kernel/fpsimd.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/de89368de3894a8db27caeb8fd902ba1c49f696a
https://git.kernel.org/stable/c/43be952e885476dafb74aa832c0847b2f4f650c6
https://git.kernel.org/stable/c/6103f9ba51a59afb5a0f32299c837377c5a5a693
https://git.kernel.org/stable/c/c4a4786d93e99517d6f10ed56b9ffba4ce88d3b3
https://git.kernel.org/stable/c/d3eaab3c70905c5467e5c4ea403053d67505adeb
Powered by blists - more mailing lists