CVE-2025-23162
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/05/2025
Last modified:
05/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
drm/xe/vf: Don&#39;t try to trigger a full GT reset if VF<br />
<br />
VFs don&#39;t have access to the GDRST(0x941c) register that driver<br />
uses to reset a GT. Attempt to trigger a reset using debugfs:<br />
<br />
$ cat /sys/kernel/debug/dri/0000:00:02.1/gt0/force_reset<br />
<br />
or due to a hang condition detected by the driver leads to:<br />
<br />
[ ] xe 0000:00:02.1: [drm] GT0: trying reset from force_reset [xe]<br />
[ ] xe 0000:00:02.1: [drm] GT0: reset queued<br />
[ ] xe 0000:00:02.1: [drm] GT0: reset started<br />
[ ] ------------[ cut here ]------------<br />
[ ] xe 0000:00:02.1: [drm] GT0: VF is trying to write 0x1 to an inaccessible register 0x941c+0x0<br />
[ ] WARNING: CPU: 3 PID: 3069 at drivers/gpu/drm/xe/xe_gt_sriov_vf.c:996 xe_gt_sriov_vf_write32+0xc6/0x580 [xe]<br />
[ ] RIP: 0010:xe_gt_sriov_vf_write32+0xc6/0x580 [xe]<br />
[ ] Call Trace:<br />
[ ] <br />
[ ] ? show_regs+0x6c/0x80<br />
[ ] ? __warn+0x93/0x1c0<br />
[ ] ? xe_gt_sriov_vf_write32+0xc6/0x580 [xe]<br />
[ ] ? report_bug+0x182/0x1b0<br />
[ ] ? handle_bug+0x6e/0xb0<br />
[ ] ? exc_invalid_op+0x18/0x80<br />
[ ] ? asm_exc_invalid_op+0x1b/0x20<br />
[ ] ? xe_gt_sriov_vf_write32+0xc6/0x580 [xe]<br />
[ ] ? xe_gt_sriov_vf_write32+0xc6/0x580 [xe]<br />
[ ] ? xe_gt_tlb_invalidation_reset+0xef/0x110 [xe]<br />
[ ] ? __mutex_unlock_slowpath+0x41/0x2e0<br />
[ ] xe_mmio_write32+0x64/0x150 [xe]<br />
[ ] do_gt_reset+0x2f/0xa0 [xe]<br />
[ ] gt_reset_worker+0x14e/0x1e0 [xe]<br />
[ ] process_one_work+0x21c/0x740<br />
[ ] worker_thread+0x1db/0x3c0<br />
<br />
Fix that by sending H2G VF_RESET(0x5507) action instead.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.8 (including) | 6.12.24 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.13.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.14 (including) | 6.14.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



