lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025072555-CVE-2025-38354-bdcd@gregkh>
Date: Fri, 25 Jul 2025 14:47:55 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2025-38354: drm/msm/gpu: Fix crash when throttling GPU immediately during boot

From: Greg Kroah-Hartman <gregkh@...nel.org>

Description
===========

In the Linux kernel, the following vulnerability has been resolved:

drm/msm/gpu: Fix crash when throttling GPU immediately during boot

There is a small chance that the GPU is already hot during boot. In that
case, the call to of_devfreq_cooling_register() will immediately try to
apply devfreq cooling, as seen in the following crash:

  Unable to handle kernel paging request at virtual address 0000000000014110
  pc : a6xx_gpu_busy+0x1c/0x58 [msm]
  lr : msm_devfreq_get_dev_status+0xbc/0x140 [msm]
  Call trace:
   a6xx_gpu_busy+0x1c/0x58 [msm] (P)
   devfreq_simple_ondemand_func+0x3c/0x150
   devfreq_update_target+0x44/0xd8
   qos_max_notifier_call+0x30/0x84
   blocking_notifier_call_chain+0x6c/0xa0
   pm_qos_update_target+0xd0/0x110
   freq_qos_apply+0x3c/0x74
   apply_constraint+0x88/0x148
   __dev_pm_qos_update_request+0x7c/0xcc
   dev_pm_qos_update_request+0x38/0x5c
   devfreq_cooling_set_cur_state+0x98/0xf0
   __thermal_cdev_update+0x64/0xb4
   thermal_cdev_update+0x4c/0x58
   step_wise_manage+0x1f0/0x318
   __thermal_zone_device_update+0x278/0x424
   __thermal_cooling_device_register+0x2bc/0x308
   thermal_of_cooling_device_register+0x10/0x1c
   of_devfreq_cooling_register_power+0x240/0x2bc
   of_devfreq_cooling_register+0x14/0x20
   msm_devfreq_init+0xc4/0x1a0 [msm]
   msm_gpu_init+0x304/0x574 [msm]
   adreno_gpu_init+0x1c4/0x2e0 [msm]
   a6xx_gpu_init+0x5c8/0x9c8 [msm]
   adreno_bind+0x2a8/0x33c [msm]
   ...

At this point we haven't initialized the GMU at all yet, so we cannot read
the GMU registers inside a6xx_gpu_busy(). A similar issue was fixed before
in commit 6694482a70e9 ("drm/msm: Avoid unclocked GMU register access in
6xx gpu_busy"): msm_devfreq_init() does call devfreq_suspend_device(), but
unlike msm_devfreq_suspend(), it doesn't set the df->suspended flag
accordingly. This means the df->suspended flag does not match the actual
devfreq state after initialization and msm_devfreq_get_dev_status() will
end up accessing GMU registers, causing the crash.

Fix this by setting df->suspended correctly during initialization.

Patchwork: https://patchwork.freedesktop.org/patch/650772/

The Linux kernel CVE team has assigned CVE-2025-38354 to this issue.


Affected and fixed versions
===========================

	Issue introduced in 6.0 with commit 6694482a70e9536efbf2ac233cbf0c302d6e2dae and fixed in 6.1.143 with commit ae2015b0dbc0eea7aaf022194371f451f784d994
	Issue introduced in 6.0 with commit 6694482a70e9536efbf2ac233cbf0c302d6e2dae and fixed in 6.6.96 with commit 7946a10f8da75abc494e4bb80243e153e93e459a
	Issue introduced in 6.0 with commit 6694482a70e9536efbf2ac233cbf0c302d6e2dae and fixed in 6.12.36 with commit 1847ea44e3bdf7da8ff4158bc01b43a2e46394bd
	Issue introduced in 6.0 with commit 6694482a70e9536efbf2ac233cbf0c302d6e2dae and fixed in 6.15.5 with commit a6f673cc9488fd722c601fe020601dba14db21b2
	Issue introduced in 6.0 with commit 6694482a70e9536efbf2ac233cbf0c302d6e2dae and fixed in 6.16-rc1 with commit b71717735be48d7743a34897e9e44a0b53e30c0e
	Issue introduced in 5.18.18 with commit 1f6c087dd6a915f1c3471f0f0f696847fc8c592f
	Issue introduced in 5.19.2 with commit 9c8b3f05fb18fba12f3fca80a378c9b8f3d04cd6

Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.

Unaffected versions might change over time as fixes are backported to
older supported kernel versions.  The official CVE entry at
	https://cve.org/CVERecord/?id=CVE-2025-38354
will be updated if fixes are backported, please check that for the most
up to date information about this issue.


Affected files
==============

The file(s) affected by this issue are:
	drivers/gpu/drm/msm/msm_gpu_devfreq.c


Mitigation
==========

The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes.  Individual
changes are never tested alone, but rather are part of a larger kernel
release.  Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all.  If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
	https://git.kernel.org/stable/c/ae2015b0dbc0eea7aaf022194371f451f784d994
	https://git.kernel.org/stable/c/7946a10f8da75abc494e4bb80243e153e93e459a
	https://git.kernel.org/stable/c/1847ea44e3bdf7da8ff4158bc01b43a2e46394bd
	https://git.kernel.org/stable/c/a6f673cc9488fd722c601fe020601dba14db21b2
	https://git.kernel.org/stable/c/b71717735be48d7743a34897e9e44a0b53e30c0e

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ