[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025072555-CVE-2025-38354-bdcd@gregkh>
Date: Fri, 25 Jul 2025 14:47:55 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2025-38354: drm/msm/gpu: Fix crash when throttling GPU immediately during boot
From: Greg Kroah-Hartman <gregkh@...nel.org>
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
drm/msm/gpu: Fix crash when throttling GPU immediately during boot
There is a small chance that the GPU is already hot during boot. In that
case, the call to of_devfreq_cooling_register() will immediately try to
apply devfreq cooling, as seen in the following crash:
Unable to handle kernel paging request at virtual address 0000000000014110
pc : a6xx_gpu_busy+0x1c/0x58 [msm]
lr : msm_devfreq_get_dev_status+0xbc/0x140 [msm]
Call trace:
a6xx_gpu_busy+0x1c/0x58 [msm] (P)
devfreq_simple_ondemand_func+0x3c/0x150
devfreq_update_target+0x44/0xd8
qos_max_notifier_call+0x30/0x84
blocking_notifier_call_chain+0x6c/0xa0
pm_qos_update_target+0xd0/0x110
freq_qos_apply+0x3c/0x74
apply_constraint+0x88/0x148
__dev_pm_qos_update_request+0x7c/0xcc
dev_pm_qos_update_request+0x38/0x5c
devfreq_cooling_set_cur_state+0x98/0xf0
__thermal_cdev_update+0x64/0xb4
thermal_cdev_update+0x4c/0x58
step_wise_manage+0x1f0/0x318
__thermal_zone_device_update+0x278/0x424
__thermal_cooling_device_register+0x2bc/0x308
thermal_of_cooling_device_register+0x10/0x1c
of_devfreq_cooling_register_power+0x240/0x2bc
of_devfreq_cooling_register+0x14/0x20
msm_devfreq_init+0xc4/0x1a0 [msm]
msm_gpu_init+0x304/0x574 [msm]
adreno_gpu_init+0x1c4/0x2e0 [msm]
a6xx_gpu_init+0x5c8/0x9c8 [msm]
adreno_bind+0x2a8/0x33c [msm]
...
At this point we haven't initialized the GMU at all yet, so we cannot read
the GMU registers inside a6xx_gpu_busy(). A similar issue was fixed before
in commit 6694482a70e9 ("drm/msm: Avoid unclocked GMU register access in
6xx gpu_busy"): msm_devfreq_init() does call devfreq_suspend_device(), but
unlike msm_devfreq_suspend(), it doesn't set the df->suspended flag
accordingly. This means the df->suspended flag does not match the actual
devfreq state after initialization and msm_devfreq_get_dev_status() will
end up accessing GMU registers, causing the crash.
Fix this by setting df->suspended correctly during initialization.
Patchwork: https://patchwork.freedesktop.org/patch/650772/
The Linux kernel CVE team has assigned CVE-2025-38354 to this issue.
Affected and fixed versions
===========================
Issue introduced in 6.0 with commit 6694482a70e9536efbf2ac233cbf0c302d6e2dae and fixed in 6.1.143 with commit ae2015b0dbc0eea7aaf022194371f451f784d994
Issue introduced in 6.0 with commit 6694482a70e9536efbf2ac233cbf0c302d6e2dae and fixed in 6.6.96 with commit 7946a10f8da75abc494e4bb80243e153e93e459a
Issue introduced in 6.0 with commit 6694482a70e9536efbf2ac233cbf0c302d6e2dae and fixed in 6.12.36 with commit 1847ea44e3bdf7da8ff4158bc01b43a2e46394bd
Issue introduced in 6.0 with commit 6694482a70e9536efbf2ac233cbf0c302d6e2dae and fixed in 6.15.5 with commit a6f673cc9488fd722c601fe020601dba14db21b2
Issue introduced in 6.0 with commit 6694482a70e9536efbf2ac233cbf0c302d6e2dae and fixed in 6.16-rc1 with commit b71717735be48d7743a34897e9e44a0b53e30c0e
Issue introduced in 5.18.18 with commit 1f6c087dd6a915f1c3471f0f0f696847fc8c592f
Issue introduced in 5.19.2 with commit 9c8b3f05fb18fba12f3fca80a378c9b8f3d04cd6
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2025-38354
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
drivers/gpu/drm/msm/msm_gpu_devfreq.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/ae2015b0dbc0eea7aaf022194371f451f784d994
https://git.kernel.org/stable/c/7946a10f8da75abc494e4bb80243e153e93e459a
https://git.kernel.org/stable/c/1847ea44e3bdf7da8ff4158bc01b43a2e46394bd
https://git.kernel.org/stable/c/a6f673cc9488fd722c601fe020601dba14db21b2
https://git.kernel.org/stable/c/b71717735be48d7743a34897e9e44a0b53e30c0e
Powered by blists - more mailing lists