CVE-2025-38354 (GCVE-0-2025-38354)
Vulnerability from cvelistv5
Published
2025-07-25 12:47
Modified
2025-07-28 04:19
Severity ?
VLAI Severity ?
EPSS score ?
Summary
In the Linux kernel, the following vulnerability has been resolved:
drm/msm/gpu: Fix crash when throttling GPU immediately during boot
There is a small chance that the GPU is already hot during boot. In that
case, the call to of_devfreq_cooling_register() will immediately try to
apply devfreq cooling, as seen in the following crash:
Unable to handle kernel paging request at virtual address 0000000000014110
pc : a6xx_gpu_busy+0x1c/0x58 [msm]
lr : msm_devfreq_get_dev_status+0xbc/0x140 [msm]
Call trace:
a6xx_gpu_busy+0x1c/0x58 [msm] (P)
devfreq_simple_ondemand_func+0x3c/0x150
devfreq_update_target+0x44/0xd8
qos_max_notifier_call+0x30/0x84
blocking_notifier_call_chain+0x6c/0xa0
pm_qos_update_target+0xd0/0x110
freq_qos_apply+0x3c/0x74
apply_constraint+0x88/0x148
__dev_pm_qos_update_request+0x7c/0xcc
dev_pm_qos_update_request+0x38/0x5c
devfreq_cooling_set_cur_state+0x98/0xf0
__thermal_cdev_update+0x64/0xb4
thermal_cdev_update+0x4c/0x58
step_wise_manage+0x1f0/0x318
__thermal_zone_device_update+0x278/0x424
__thermal_cooling_device_register+0x2bc/0x308
thermal_of_cooling_device_register+0x10/0x1c
of_devfreq_cooling_register_power+0x240/0x2bc
of_devfreq_cooling_register+0x14/0x20
msm_devfreq_init+0xc4/0x1a0 [msm]
msm_gpu_init+0x304/0x574 [msm]
adreno_gpu_init+0x1c4/0x2e0 [msm]
a6xx_gpu_init+0x5c8/0x9c8 [msm]
adreno_bind+0x2a8/0x33c [msm]
...
At this point we haven't initialized the GMU at all yet, so we cannot read
the GMU registers inside a6xx_gpu_busy(). A similar issue was fixed before
in commit 6694482a70e9 ("drm/msm: Avoid unclocked GMU register access in
6xx gpu_busy"): msm_devfreq_init() does call devfreq_suspend_device(), but
unlike msm_devfreq_suspend(), it doesn't set the df->suspended flag
accordingly. This means the df->suspended flag does not match the actual
devfreq state after initialization and msm_devfreq_get_dev_status() will
end up accessing GMU registers, causing the crash.
Fix this by setting df->suspended correctly during initialization.
Patchwork: https://patchwork.freedesktop.org/patch/650772/
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
► | Linux | Linux |
Version: 6694482a70e9536efbf2ac233cbf0c302d6e2dae Version: 6694482a70e9536efbf2ac233cbf0c302d6e2dae Version: 6694482a70e9536efbf2ac233cbf0c302d6e2dae Version: 6694482a70e9536efbf2ac233cbf0c302d6e2dae Version: 6694482a70e9536efbf2ac233cbf0c302d6e2dae Version: 1f6c087dd6a915f1c3471f0f0f696847fc8c592f Version: 9c8b3f05fb18fba12f3fca80a378c9b8f3d04cd6 |
|
{ "containers": { "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/msm/msm_gpu_devfreq.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "lessThan": "ae2015b0dbc0eea7aaf022194371f451f784d994", "status": "affected", "version": "6694482a70e9536efbf2ac233cbf0c302d6e2dae", "versionType": "git" }, { "lessThan": "7946a10f8da75abc494e4bb80243e153e93e459a", "status": "affected", "version": "6694482a70e9536efbf2ac233cbf0c302d6e2dae", "versionType": "git" }, { "lessThan": "1847ea44e3bdf7da8ff4158bc01b43a2e46394bd", "status": "affected", "version": "6694482a70e9536efbf2ac233cbf0c302d6e2dae", "versionType": "git" }, { "lessThan": "a6f673cc9488fd722c601fe020601dba14db21b2", "status": "affected", "version": "6694482a70e9536efbf2ac233cbf0c302d6e2dae", "versionType": "git" }, { "lessThan": "b71717735be48d7743a34897e9e44a0b53e30c0e", "status": "affected", "version": "6694482a70e9536efbf2ac233cbf0c302d6e2dae", "versionType": "git" }, { "status": "affected", "version": "1f6c087dd6a915f1c3471f0f0f696847fc8c592f", "versionType": "git" }, { "status": "affected", "version": "9c8b3f05fb18fba12f3fca80a378c9b8f3d04cd6", "versionType": "git" } ] }, { "defaultStatus": "affected", "product": "Linux", "programFiles": [ "drivers/gpu/drm/msm/msm_gpu_devfreq.c" ], "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git", "vendor": "Linux", "versions": [ { "status": "affected", "version": "6.0" }, { "lessThan": "6.0", "status": "unaffected", "version": "0", "versionType": "semver" }, { "lessThanOrEqual": "6.1.*", "status": "unaffected", "version": "6.1.143", "versionType": "semver" }, { "lessThanOrEqual": "6.6.*", "status": "unaffected", "version": "6.6.96", "versionType": "semver" }, { "lessThanOrEqual": "6.12.*", "status": "unaffected", "version": "6.12.36", "versionType": "semver" }, { "lessThanOrEqual": "6.15.*", "status": "unaffected", "version": "6.15.5", "versionType": "semver" }, { "lessThanOrEqual": "*", "status": "unaffected", "version": "6.16", "versionType": "original_commit_for_fix" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.1.143", "versionStartIncluding": "6.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.6.96", "versionStartIncluding": "6.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.12.36", "versionStartIncluding": "6.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.15.5", "versionStartIncluding": "6.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.16", "versionStartIncluding": "6.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.18.18", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.19.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/gpu: Fix crash when throttling GPU immediately during boot\n\nThere is a small chance that the GPU is already hot during boot. In that\ncase, the call to of_devfreq_cooling_register() will immediately try to\napply devfreq cooling, as seen in the following crash:\n\n Unable to handle kernel paging request at virtual address 0000000000014110\n pc : a6xx_gpu_busy+0x1c/0x58 [msm]\n lr : msm_devfreq_get_dev_status+0xbc/0x140 [msm]\n Call trace:\n a6xx_gpu_busy+0x1c/0x58 [msm] (P)\n devfreq_simple_ondemand_func+0x3c/0x150\n devfreq_update_target+0x44/0xd8\n qos_max_notifier_call+0x30/0x84\n blocking_notifier_call_chain+0x6c/0xa0\n pm_qos_update_target+0xd0/0x110\n freq_qos_apply+0x3c/0x74\n apply_constraint+0x88/0x148\n __dev_pm_qos_update_request+0x7c/0xcc\n dev_pm_qos_update_request+0x38/0x5c\n devfreq_cooling_set_cur_state+0x98/0xf0\n __thermal_cdev_update+0x64/0xb4\n thermal_cdev_update+0x4c/0x58\n step_wise_manage+0x1f0/0x318\n __thermal_zone_device_update+0x278/0x424\n __thermal_cooling_device_register+0x2bc/0x308\n thermal_of_cooling_device_register+0x10/0x1c\n of_devfreq_cooling_register_power+0x240/0x2bc\n of_devfreq_cooling_register+0x14/0x20\n msm_devfreq_init+0xc4/0x1a0 [msm]\n msm_gpu_init+0x304/0x574 [msm]\n adreno_gpu_init+0x1c4/0x2e0 [msm]\n a6xx_gpu_init+0x5c8/0x9c8 [msm]\n adreno_bind+0x2a8/0x33c [msm]\n ...\n\nAt this point we haven\u0027t initialized the GMU at all yet, so we cannot read\nthe GMU registers inside a6xx_gpu_busy(). A similar issue was fixed before\nin commit 6694482a70e9 (\"drm/msm: Avoid unclocked GMU register access in\n6xx gpu_busy\"): msm_devfreq_init() does call devfreq_suspend_device(), but\nunlike msm_devfreq_suspend(), it doesn\u0027t set the df-\u003esuspended flag\naccordingly. This means the df-\u003esuspended flag does not match the actual\ndevfreq state after initialization and msm_devfreq_get_dev_status() will\nend up accessing GMU registers, causing the crash.\n\nFix this by setting df-\u003esuspended correctly during initialization.\n\nPatchwork: https://patchwork.freedesktop.org/patch/650772/" } ], "providerMetadata": { "dateUpdated": "2025-07-28T04:19:44.083Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "references": [ { "url": "https://git.kernel.org/stable/c/ae2015b0dbc0eea7aaf022194371f451f784d994" }, { "url": "https://git.kernel.org/stable/c/7946a10f8da75abc494e4bb80243e153e93e459a" }, { "url": "https://git.kernel.org/stable/c/1847ea44e3bdf7da8ff4158bc01b43a2e46394bd" }, { "url": "https://git.kernel.org/stable/c/a6f673cc9488fd722c601fe020601dba14db21b2" }, { "url": "https://git.kernel.org/stable/c/b71717735be48d7743a34897e9e44a0b53e30c0e" } ], "title": "drm/msm/gpu: Fix crash when throttling GPU immediately during boot", "x_generator": { "engine": "bippy-1.2.0" } } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2025-38354", "datePublished": "2025-07-25T12:47:26.087Z", "dateReserved": "2025-04-16T04:51:24.007Z", "dateUpdated": "2025-07-28T04:19:44.083Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-38354\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-07-25T13:15:24.123\",\"lastModified\":\"2025-07-25T15:29:19.837\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ndrm/msm/gpu: Fix crash when throttling GPU immediately during boot\\n\\nThere is a small chance that the GPU is already hot during boot. In that\\ncase, the call to of_devfreq_cooling_register() will immediately try to\\napply devfreq cooling, as seen in the following crash:\\n\\n Unable to handle kernel paging request at virtual address 0000000000014110\\n pc : a6xx_gpu_busy+0x1c/0x58 [msm]\\n lr : msm_devfreq_get_dev_status+0xbc/0x140 [msm]\\n Call trace:\\n a6xx_gpu_busy+0x1c/0x58 [msm] (P)\\n devfreq_simple_ondemand_func+0x3c/0x150\\n devfreq_update_target+0x44/0xd8\\n qos_max_notifier_call+0x30/0x84\\n blocking_notifier_call_chain+0x6c/0xa0\\n pm_qos_update_target+0xd0/0x110\\n freq_qos_apply+0x3c/0x74\\n apply_constraint+0x88/0x148\\n __dev_pm_qos_update_request+0x7c/0xcc\\n dev_pm_qos_update_request+0x38/0x5c\\n devfreq_cooling_set_cur_state+0x98/0xf0\\n __thermal_cdev_update+0x64/0xb4\\n thermal_cdev_update+0x4c/0x58\\n step_wise_manage+0x1f0/0x318\\n __thermal_zone_device_update+0x278/0x424\\n __thermal_cooling_device_register+0x2bc/0x308\\n thermal_of_cooling_device_register+0x10/0x1c\\n of_devfreq_cooling_register_power+0x240/0x2bc\\n of_devfreq_cooling_register+0x14/0x20\\n msm_devfreq_init+0xc4/0x1a0 [msm]\\n msm_gpu_init+0x304/0x574 [msm]\\n adreno_gpu_init+0x1c4/0x2e0 [msm]\\n a6xx_gpu_init+0x5c8/0x9c8 [msm]\\n adreno_bind+0x2a8/0x33c [msm]\\n ...\\n\\nAt this point we haven\u0027t initialized the GMU at all yet, so we cannot read\\nthe GMU registers inside a6xx_gpu_busy(). A similar issue was fixed before\\nin commit 6694482a70e9 (\\\"drm/msm: Avoid unclocked GMU register access in\\n6xx gpu_busy\\\"): msm_devfreq_init() does call devfreq_suspend_device(), but\\nunlike msm_devfreq_suspend(), it doesn\u0027t set the df-\u003esuspended flag\\naccordingly. This means the df-\u003esuspended flag does not match the actual\\ndevfreq state after initialization and msm_devfreq_get_dev_status() will\\nend up accessing GMU registers, causing the crash.\\n\\nFix this by setting df-\u003esuspended correctly during initialization.\\n\\nPatchwork: https://patchwork.freedesktop.org/patch/650772/\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1847ea44e3bdf7da8ff4158bc01b43a2e46394bd\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/7946a10f8da75abc494e4bb80243e153e93e459a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/a6f673cc9488fd722c601fe020601dba14db21b2\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ae2015b0dbc0eea7aaf022194371f451f784d994\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/b71717735be48d7743a34897e9e44a0b53e30c0e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…