Lucene search

K
vulnrichmentLinuxVULNRICHMENT:CVE-2023-52625
HistoryMar 26, 2024 - 5:49 p.m.

CVE-2023-52625 drm/amd/display: Refactor DMCUB enter/exit idle interface

2024-03-2617:49:58
Linux
github.com
2
linux kernel
vulnerability
dmcub
idle state
command
software
hardware
driver
optimization
wrapper
infinite loop
patch

AI Score

7.1

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Refactor DMCUB enter/exit idle interface

[Why]
We can hang in place trying to send commands when the DMCUB isn’t
powered on.

[How]
We need to exit out of the idle state prior to sending a command,
but the process that performs the exit also invokes a command itself.

Fixing this issue involves the following:

  1. Using a software state to track whether or not we need to start
    the process to exit idle or notify idle.

It’s possible for the hardware to have exited an idle state without
driver knowledge, but entering one is always restricted to a driver
allow - which makes the SW state vs HW state mismatch issue purely one
of optimization, which should seldomly be hit, if at all.

  1. Refactor any instances of exit/notify idle to use a single wrapper
    that maintains this SW state.

This works simialr to dc_allow_idle_optimizations, but works at the
DMCUB level and makes sure the state is marked prior to any notify/exit
idle so we don’t enter an infinite loop.

  1. Make sure we exit out of idle prior to sending any commands or
    waiting for DMCUB idle.

This patch takes care of 1/2. A future patch will take care of wrapping
DMCUB command submission with calls to this new interface.

AI Score

7.1

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2023-52625