We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-22094

powerpc/perf: Fix ref-counting on the PMU 'vpa_pmu'



Description

In the Linux kernel, the following vulnerability has been resolved: powerpc/perf: Fix ref-counting on the PMU 'vpa_pmu' Commit 176cda0619b6 ("powerpc/perf: Add perf interface to expose vpa counters") introduced 'vpa_pmu' to expose Book3s-HV nested APIv2 provided L1<->L2 context switch latency counters to L1 user-space via perf-events. However the newly introduced PMU named 'vpa_pmu' doesn't assign ownership of the PMU to the module 'vpa_pmu'. Consequently the module 'vpa_pmu' can be unloaded while one of the perf-events are still active, which can lead to kernel oops and panic of the form below on a Pseries-LPAR: BUG: Kernel NULL pointer dereference on read at 0x00000058 <snip> NIP [c000000000506cb8] event_sched_out+0x40/0x258 LR [c00000000050e8a4] __perf_remove_from_context+0x7c/0x2b0 Call Trace: [c00000025fc3fc30] [c00000025f8457a8] 0xc00000025f8457a8 (unreliable) [c00000025fc3fc80] [fffffffffffffee0] 0xfffffffffffffee0 [c00000025fc3fcd0] [c000000000501e70] event_function+0xa8/0x120 <snip> Kernel panic - not syncing: Aiee, killing interrupt handler! Fix this by adding the module ownership to 'vpa_pmu' so that the module 'vpa_pmu' is ref-counted and prevented from being unloaded when perf-events are initialized.

Reserved 2024-12-29 | Published 2025-04-16 | Updated 2025-05-26 | Assigner Linux

Product status

Default status
unaffected

176cda0619b6c17a553625f6e2fcbc3981ad667d before 70ea7c5189197c6f5acdcfd8a2651be2c41e2faa
affected

176cda0619b6c17a553625f6e2fcbc3981ad667d before 6cf045b51e2c5721db7e55305f09ee32741e00f9
affected

176cda0619b6c17a553625f6e2fcbc3981ad667d before ff99d5b6a246715f2257123cdf6c4a29cb33aa78
affected

Default status
affected

6.13
affected

Any version before 6.13
unaffected

6.13.11
unaffected

6.14.2
unaffected

6.15
unaffected

References

git.kernel.org/...c/70ea7c5189197c6f5acdcfd8a2651be2c41e2faa

git.kernel.org/...c/6cf045b51e2c5721db7e55305f09ee32741e00f9

git.kernel.org/...c/ff99d5b6a246715f2257123cdf6c4a29cb33aa78

cve.org (CVE-2025-22094)

nvd.nist.gov (CVE-2025-22094)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-22094

Support options

Helpdesk Chat, Email, Knowledgebase