CVE-2025-40152

Source
https://cve.org/CVERecord?id=CVE-2025-40152
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-40152.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-40152
Downstream
Published
2025-11-12T10:23:27.925Z
Modified
2025-12-05T10:21:18.203720Z
Summary
drm/msm: Fix bootup splat with separate_gpu_drm modparam
Details

In the Linux kernel, the following vulnerability has been resolved:

drm/msm: Fix bootup splat with separategpudrm modparam

The drmgemforeachgpuvmbo() call from lookupvma() accesses drmgemobj.gpuva.list, which is not initialized when the drm driver does not support DRIVERGEMGPUVA feature. Enable it for msmkms drm driver to fix the splat seen when msm.separategpu_drm=1 modparam is set:

[ 9.506020] Unable to handle kernel paging request at virtual address fffffffffffffff0 [ 9.523160] Mem abort info: [ 9.523161] ESR = 0x0000000096000006 [ 9.523163] EC = 0x25: DABT (current EL), IL = 32 bits [ 9.523165] SET = 0, FnV = 0 [ 9.523166] EA = 0, S1PTW = 0 [ 9.523167] FSC = 0x06: level 2 translation fault [ 9.523169] Data abort info: [ 9.523170] ISV = 0, ISS = 0x00000006, ISS2 = 0x00000000 [ 9.523171] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 9.523172] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 9.523174] swapper pgtable: 4k pages, 48-bit VAs, pgdp=0000000ad370f000 [ 9.523176] [fffffffffffffff0] pgd=0000000000000000, p4d=0000000ad4787403, pud=0000000ad4788403, pmd=0000000000000000 [ 9.523184] Internal error: Oops: 0000000096000006 [#1] SMP [ 9.592968] CPU: 9 UID: 0 PID: 448 Comm: (udev-worker) Not tainted 6.17.0-rc4-assorted-fix-00005-g0e9bb53a2282-dirty #3 PREEMPT [ 9.592970] Hardware name: Qualcomm CRD, BIOS 6.0.240718.BOOT.MXF.2.4-00515-HAMOA-1 07/18/2024 [ 9.592971] pstate: a1400005 (NzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) [ 9.592973] pc : lookupvma+0x28/0xe0 [msm] [ 9.592996] lr : getvmalocked+0x2c/0x128 [msm] [ 9.763632] sp : ffff800082dab460 [ 9.763666] Call trace: [ 9.763668] lookupvma+0x28/0xe0 [msm] (P) [ 9.763688] getvmalocked+0x2c/0x128 [msm] [ 9.763706] msmgemgetandpiniovarange+0x68/0x11c [msm] [ 9.763723] msmgemgetandpiniova+0x18/0x24 [msm] [ 9.763740] msmfbdevdriverfbdevprobe+0xd0/0x258 [msm] [ 9.763760] _drmfbhelperinitialconfigandunlock+0x288/0x528 [drmkmshelper] [ 9.763771] drmfbhelperinitialconfig+0x44/0x54 [drmkmshelper] [ 9.763779] drmfbdevclienthotplug+0x84/0xd4 [drmclientlib] [ 9.763782] drmclientregister+0x58/0x9c [drm] [ 9.763806] drmfbdevclientsetup+0xe8/0xcf0 [drmclientlib] [ 9.763809] drmclientsetup+0xb4/0xd8 [drmclientlib] [ 9.763811] msmdrmkmspostinit+0x2c/0x3c [msm] [ 9.763830] msmdrminit+0x1a8/0x22c [msm] [ 9.763848] msmdrmbind+0x30/0x3c [msm] [ 9.919273] trytobringupaggregatedevice+0x168/0x1d4 [ 9.919283] _componentadd+0xa4/0x170 [ 9.919286] componentadd+0x14/0x20 [ 9.919288] msmdpdisplayprobetail+0x4c/0xac [msm] [ 9.919315] msmdpauxbusdoneprobe+0x14/0x20 [msm] [ 9.919335] dpauxepprobe+0x4c/0xf0 [drmdpauxbus] [ 9.919341] reallyprobe+0xbc/0x298 [ 9.919345] _driverprobedevice+0x78/0x12c [ 9.919348] driverprobedevice+0x40/0x160 [ 9.919350] _driverattach+0x94/0x19c [ 9.919353] busforeachdev+0x74/0xd4 [ 9.919355] driverattach+0x24/0x30 [ 9.919358] busadddriver+0xe4/0x208 [ 9.919360] driverregister+0x60/0x128 [ 9.919363] _dpauxdpdriverregister+0x24/0x30 [drmdpauxbus] [ 9.919365] atana33xc20init+0x20/0x1000 [panelsamsungatna33xc20] [ 9.919370] dooneinitcall+0x6c/0x1b0 [ 9.919374] doinitmodule+0x58/0x234 [ 9.919377] loadmodule+0x19cc/0x1bd4 [ 9.919380] initmodulefromfile+0x84/0xc4 [ 9.919382] _arm64sysfinitmodule+0x1b8/0x2cc [ 9.919384] invokesyscall+0x48/0x110 [ 9.919389] el0svccommon.constprop.0+0xc8/0xe8 [ 9.919393] doel0svc+0x20/0x2c [ 9.919396] el0svc+0x34/0xf0 [ 9.919401] el0t64synchandler+0xa0/0xe4 [ 9.919403] el0t64_sync+0x198/0x19c [ 9.919407] Code: eb0000bf 54000480 d100a003 aa0303e2 (f8418c44) [ 9.919410] ---[ end trace 0000000000000000 ]---

Patchwork: https://patchwork.freedesktop.org/pa ---truncated---

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40152.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
217ed15bd399980981f90f4332bc7ad4b05baa7e
Fixed
87aff6d08f3b13bfad66df7c13af5f3a3548d5b9
Fixed
f028bcafb6dfb4c2bb656cbff9e6a66222d3d3d7

Affected versions

v6.*
v6.16
v6.16-rc3
v6.16-rc4
v6.16-rc5
v6.16-rc6
v6.16-rc7
v6.17
v6.17-rc1
v6.17-rc2
v6.17-rc3
v6.17-rc4
v6.17-rc5
v6.17-rc6
v6.17-rc7
v6.17.1
v6.17.2

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-40152.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.17.0
Fixed
6.17.3

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-40152.json"