Executive Summary

Informations
Name CVE-2025-21880 First vendor Publication 2025-03-27
Vendor Cve Last vendor Modification 2025-03-27

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

drm/xe/userptr: fix EFAULT handling

Currently we treat EFAULT from hmm_range_fault() as a non-fatal error when called from xe_vm_userptr_pin() with the idea that we want to avoid killing the entire vm and chucking an error, under the assumption that the user just did an unmap or something, and has no intention of actually touching that memory from the GPU. At this point we have already zapped the PTEs so any access should generate a page fault, and if the pin fails there also it will then become fatal.

However it looks like it's possible for the userptr vma to still be on the rebind list in preempt_rebind_work_func(), if we had to retry the pin again due to something happening in the caller before we did the rebind step, but in the meantime needing to re-validate the userptr and this time hitting the EFAULT.

This explains an internal user report of hitting:

[ 191.738349] WARNING: CPU: 1 PID: 157 at drivers/gpu/drm/xe/xe_res_cursor.h:158 xe_pt_stage_bind.constprop.0+0x60a/0x6b0 [xe] [ 191.738551] Workqueue: xe-ordered-wq preempt_rebind_work_func [xe] [ 191.738616] RIP: 0010:xe_pt_stage_bind.constprop.0+0x60a/0x6b0 [xe] [ 191.738690] Call Trace: [ 191.738692] [ 191.738694] ? show_regs+0x69/0x80 [ 191.738698] ? __warn+0x93/0x1a0 [ 191.738703] ? xe_pt_stage_bind.constprop.0+0x60a/0x6b0 [xe] [ 191.738759] ? report_bug+0x18f/0x1a0 [ 191.738764] ? handle_bug+0x63/0xa0 [ 191.738767] ? exc_invalid_op+0x19/0x70 [ 191.738770] ? asm_exc_invalid_op+0x1b/0x20 [ 191.738777] ? xe_pt_stage_bind.constprop.0+0x60a/0x6b0 [xe] [ 191.738834] ? ret_from_fork_asm+0x1a/0x30 [ 191.738849] bind_op_prepare+0x105/0x7b0 [xe] [ 191.738906] ? dma_resv_reserve_fences+0x301/0x380 [ 191.738912] xe_pt_update_ops_prepare+0x28c/0x4b0 [xe] [ 191.738966] ? kmemleak_alloc+0x4b/0x80 [ 191.738973] ops_execute+0x188/0x9d0 [xe] [ 191.739036] xe_vm_rebind+0x4ce/0x5a0 [xe] [ 191.739098] ? trace_hardirqs_on+0x4d/0x60 [ 191.739112] preempt_rebind_work_func+0x76f/0xd00 [xe]

Followed by NPD, when running some workload, since the sg was never actually populated but the vma is still marked for rebind when it should be skipped for this special EFAULT case. This is confirmed to fix the user report.

v2 (MattB):
- Move earlier. v3 (MattB):
- Update the commit message to make it clear that this indeed fixes the
issue.

(cherry picked from commit 6b93cb98910c826c2e2004942f8b060311e43618)

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21880

Sources (Detail)

https://git.kernel.org/stable/c/51cc278f8ffacd5f9dc7d13191b81b912829db59
https://git.kernel.org/stable/c/a9f4fa3a7efa65615ff7db13023ac84516e99e21
https://git.kernel.org/stable/c/daad16d0a538fa938e344fd83927bbcfcd8a66ec
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
Date Informations
2025-04-21 05:53:06
  • Multiple Updates
2025-04-21 05:52:40
  • Multiple Updates
2025-04-20 14:17:25
  • Multiple Updates
2025-04-20 14:17:11
  • Multiple Updates
2025-04-20 07:31:08
  • Multiple Updates
2025-04-20 07:30:49
  • Multiple Updates
2025-04-19 14:17:42
  • Multiple Updates
2025-04-19 14:17:27
  • Multiple Updates
2025-04-19 06:17:29
  • Multiple Updates
2025-04-19 06:17:15
  • Multiple Updates
2025-04-18 16:36:05
  • Multiple Updates
2025-04-18 16:35:52
  • Multiple Updates
2025-04-18 03:17:53
  • Multiple Updates
2025-04-18 03:17:37
  • Multiple Updates
2025-04-17 14:17:17
  • Multiple Updates
2025-04-17 14:17:03
  • Multiple Updates
2025-04-17 06:47:43
  • Multiple Updates
2025-04-17 06:47:26
  • Multiple Updates
2025-04-16 14:22:57
  • Multiple Updates
2025-04-16 14:22:43
  • Multiple Updates
2025-04-16 07:05:38
  • Multiple Updates
2025-04-16 07:05:23
  • Multiple Updates
2025-04-15 14:18:48
  • Multiple Updates
2025-04-15 14:18:33
  • Multiple Updates
2025-04-15 05:10:11
  • Multiple Updates
2025-04-15 05:09:57
  • Multiple Updates
2025-04-14 15:57:27
  • Multiple Updates
2025-04-14 15:57:14
  • Multiple Updates
2025-04-14 04:56:53
  • Multiple Updates
2025-04-14 04:56:05
  • Multiple Updates
2025-04-13 15:25:10
  • Multiple Updates
2025-04-13 15:24:56
  • Multiple Updates
2025-04-13 03:26:21
  • Multiple Updates
2025-04-13 03:26:06
  • Multiple Updates
2025-04-12 14:17:24
  • Multiple Updates
2025-04-12 14:17:11
  • Multiple Updates
2025-04-12 04:33:23
  • Multiple Updates
2025-04-12 04:32:58
  • Multiple Updates
2025-04-11 14:45:03
  • Multiple Updates
2025-04-11 14:44:49
  • Multiple Updates
2025-04-11 03:25:15
  • Multiple Updates
2025-04-11 03:25:01
  • Multiple Updates
2025-04-10 14:19:48
  • Multiple Updates
2025-04-10 14:19:34
  • Multiple Updates
2025-04-10 03:35:25
  • Multiple Updates
2025-04-10 03:35:09
  • Multiple Updates
2025-04-09 14:19:35
  • Multiple Updates
2025-04-09 14:19:21
  • Multiple Updates
2025-04-09 03:20:45
  • Multiple Updates
2025-04-09 03:20:32
  • Multiple Updates
2025-04-08 14:16:11
  • Multiple Updates
2025-04-08 14:15:58
  • Multiple Updates
2025-04-08 03:22:07
  • Multiple Updates
2025-04-08 03:21:53
  • Multiple Updates
2025-04-07 14:15:29
  • Multiple Updates
2025-04-07 14:15:15
  • Multiple Updates
2025-04-07 03:16:16
  • Multiple Updates
2025-04-07 03:16:02
  • Multiple Updates
2025-04-06 14:15:20
  • Multiple Updates
2025-04-06 14:15:06
  • Multiple Updates
2025-04-06 03:17:39
  • Multiple Updates
2025-04-06 03:17:25
  • Multiple Updates
2025-04-05 14:18:49
  • Multiple Updates
2025-04-05 14:18:35
  • Multiple Updates
2025-04-05 03:22:35
  • Multiple Updates
2025-04-05 03:22:21
  • Multiple Updates
2025-04-04 14:16:56
  • Multiple Updates
2025-04-04 14:16:42
  • Multiple Updates
2025-04-04 03:15:49
  • Multiple Updates
2025-04-04 03:15:35
  • Multiple Updates
2025-04-03 15:09:52
  • Multiple Updates
2025-04-03 15:09:32
  • Multiple Updates
2025-04-03 03:14:52
  • Multiple Updates
2025-04-03 03:14:38
  • Multiple Updates
2025-04-02 14:15:32
  • Multiple Updates
2025-04-02 14:15:19
  • Multiple Updates
2025-04-02 03:15:44
  • Multiple Updates
2025-04-02 03:15:30
  • Multiple Updates
2025-04-01 14:15:21
  • Multiple Updates
2025-04-01 14:15:07
  • Multiple Updates
2025-03-31 17:20:34
  • Multiple Updates
2025-03-27 17:20:57
  • First insertion