๐Ÿ” CVE Alert

CVE-2025-21657

UNKNOWN 0.0

sched_ext: Replace rq_lock() to raw_spin_rq_lock() in scx_ops_bypass()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: sched_ext: Replace rq_lock() to raw_spin_rq_lock() in scx_ops_bypass() scx_ops_bypass() iterates all CPUs to re-enqueue all the scx tasks. For each CPU, it acquires a lock using rq_lock() regardless of whether a CPU is offline or the CPU is currently running a task in a higher scheduler class (e.g., deadline). The rq_lock() is supposed to be used for online CPUs, and the use of rq_lock() may trigger an unnecessary warning in rq_pin_lock(). Therefore, replace rq_lock() to raw_spin_rq_lock() in scx_ops_bypass(). Without this change, we observe the following warning: ===== START ===== [ 6.615205] rq->balance_callback && rq->balance_callback != &balance_push_callback [ 6.615208] WARNING: CPU: 2 PID: 0 at kernel/sched/sched.h:1730 __schedule+0x1130/0x1c90 ===== END =====

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jan 21, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
0e7ffff1b8117b05635c87d3c9099f6aa9c9b689 < d9e446dd63cee7161717a6a8414ba9c6435af764 0e7ffff1b8117b05635c87d3c9099f6aa9c9b689 < 6268d5bc10354fc2ab8d44a0cd3b042d49a0417e
Linux / Linux
6.12

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/d9e446dd63cee7161717a6a8414ba9c6435af764 git.kernel.org: https://git.kernel.org/stable/c/6268d5bc10354fc2ab8d44a0cd3b042d49a0417e