CVE-2025-23162

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/05/2025
Last modified:
05/11/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/xe/vf: Don&amp;#39;t try to trigger a full GT reset if VF<br /> <br /> VFs don&amp;#39;t have access to the GDRST(0x941c) register that driver<br /> uses to reset a GT. Attempt to trigger a reset using debugfs:<br /> <br /> $ cat /sys/kernel/debug/dri/0000:00:02.1/gt0/force_reset<br /> <br /> or due to a hang condition detected by the driver leads to:<br /> <br /> [ ] xe 0000:00:02.1: [drm] GT0: trying reset from force_reset [xe]<br /> [ ] xe 0000:00:02.1: [drm] GT0: reset queued<br /> [ ] xe 0000:00:02.1: [drm] GT0: reset started<br /> [ ] ------------[ cut here ]------------<br /> [ ] xe 0000:00:02.1: [drm] GT0: VF is trying to write 0x1 to an inaccessible register 0x941c+0x0<br /> [ ] WARNING: CPU: 3 PID: 3069 at drivers/gpu/drm/xe/xe_gt_sriov_vf.c:996 xe_gt_sriov_vf_write32+0xc6/0x580 [xe]<br /> [ ] RIP: 0010:xe_gt_sriov_vf_write32+0xc6/0x580 [xe]<br /> [ ] Call Trace:<br /> [ ] <br /> [ ] ? show_regs+0x6c/0x80<br /> [ ] ? __warn+0x93/0x1c0<br /> [ ] ? xe_gt_sriov_vf_write32+0xc6/0x580 [xe]<br /> [ ] ? report_bug+0x182/0x1b0<br /> [ ] ? handle_bug+0x6e/0xb0<br /> [ ] ? exc_invalid_op+0x18/0x80<br /> [ ] ? asm_exc_invalid_op+0x1b/0x20<br /> [ ] ? xe_gt_sriov_vf_write32+0xc6/0x580 [xe]<br /> [ ] ? xe_gt_sriov_vf_write32+0xc6/0x580 [xe]<br /> [ ] ? xe_gt_tlb_invalidation_reset+0xef/0x110 [xe]<br /> [ ] ? __mutex_unlock_slowpath+0x41/0x2e0<br /> [ ] xe_mmio_write32+0x64/0x150 [xe]<br /> [ ] do_gt_reset+0x2f/0xa0 [xe]<br /> [ ] gt_reset_worker+0x14e/0x1e0 [xe]<br /> [ ] process_one_work+0x21c/0x740<br /> [ ] worker_thread+0x1db/0x3c0<br /> <br /> Fix that by sending H2G VF_RESET(0x5507) action instead.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.8 (including) 6.12.24 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.13.12 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.14 (including) 6.14.3 (excluding)