We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-38322

perf/x86/intel: Fix crash in icl_update_topdown_event()



Description

In the Linux kernel, the following vulnerability has been resolved: perf/x86/intel: Fix crash in icl_update_topdown_event() The perf_fuzzer found a hard-lockup crash on a RaptorLake machine: Oops: general protection fault, maybe for address 0xffff89aeceab400: 0000 CPU: 23 UID: 0 PID: 0 Comm: swapper/23 Tainted: [W]=WARN Hardware name: Dell Inc. Precision 9660/0VJ762 RIP: 0010:native_read_pmc+0x7/0x40 Code: cc e8 8d a9 01 00 48 89 03 5b cd cc cc cc cc 0f 1f ... RSP: 000:fffb03100273de8 EFLAGS: 00010046 .... Call Trace: <TASK> icl_update_topdown_event+0x165/0x190 ? ktime_get+0x38/0xd0 intel_pmu_read_event+0xf9/0x210 __perf_event_read+0xf9/0x210 CPUs 16-23 are E-core CPUs that don't support the perf metrics feature. The icl_update_topdown_event() should not be invoked on these CPUs. It's a regression of commit: f9bdf1f95339 ("perf/x86/intel: Avoid disable PMU if !cpuc->enabled in sample read") The bug introduced by that commit is that the is_topdown_event() function is mistakenly used to replace the is_topdown_count() call to check if the topdown functions for the perf metrics feature should be invoked. Fix it.

Reserved 2025-04-16 | Published 2025-07-10 | Updated 2025-07-10 | Assigner Linux

Product status

Default status
unaffected

f9bdf1f953392c9edd69a7f884f78c0390127029 before a85cc69acdcb05f8cd226b8ea0778b8e2e887e6f
affected

f9bdf1f953392c9edd69a7f884f78c0390127029 before b0823d5fbacb1c551d793cbfe7af24e0d1fa45ed
affected

781b2db0eb7731fbde510c268b7ccc62959c3feb
affected

e7f6922c8a5b41522a8329ea6bbf815993b2dd28
affected

3a8bec6583e5239de3bd597ab382dc6c2b0c29a1
affected

06cd7bfbb86e9db3e9013ea6636ad2c6f0a1664d
affected

d8370aa704bd7e384918c8f466856374725c0585
affected

Default status
affected

6.15
affected

Any version before 6.15
unaffected

6.15.4
unaffected

6.16-rc3
unaffected

References

git.kernel.org/...c/a85cc69acdcb05f8cd226b8ea0778b8e2e887e6f

git.kernel.org/...c/b0823d5fbacb1c551d793cbfe7af24e0d1fa45ed

cve.org (CVE-2025-38322)

nvd.nist.gov (CVE-2025-38322)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-38322

Support options

Helpdesk Chat, Email, Knowledgebase