๐Ÿ” CVE Alert

CVE-2025-22010

UNKNOWN 0.0

RDMA/hns: Fix soft lockup during bt pages loop

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: RDMA/hns: Fix soft lockup during bt pages loop Driver runs a for-loop when allocating bt pages and mapping them with buffer pages. When a large buffer (e.g. MR over 100GB) is being allocated, it may require a considerable loop count. This will lead to soft lockup: watchdog: BUG: soft lockup - CPU#27 stuck for 22s! ... Call trace: hem_list_alloc_mid_bt+0x124/0x394 [hns_roce_hw_v2] hns_roce_hem_list_request+0xf8/0x160 [hns_roce_hw_v2] hns_roce_mtr_create+0x2e4/0x360 [hns_roce_hw_v2] alloc_mr_pbl+0xd4/0x17c [hns_roce_hw_v2] hns_roce_reg_user_mr+0xf8/0x190 [hns_roce_hw_v2] ib_uverbs_reg_mr+0x118/0x290 watchdog: BUG: soft lockup - CPU#35 stuck for 23s! ... Call trace: hns_roce_hem_list_find_mtt+0x7c/0xb0 [hns_roce_hw_v2] mtr_map_bufs+0xc4/0x204 [hns_roce_hw_v2] hns_roce_mtr_create+0x31c/0x3c4 [hns_roce_hw_v2] alloc_mr_pbl+0xb0/0x160 [hns_roce_hw_v2] hns_roce_reg_user_mr+0x108/0x1c0 [hns_roce_hw_v2] ib_uverbs_reg_mr+0x120/0x2bc Add a cond_resched() to fix soft lockup during these loops. In order not to affect the allocation performance of normal-size buffer, set the loop count of a 100GB MR as the threshold to call cond_resched().

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 8, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
38389eaa4db192648916464b60f6086d6bbaa6de < 461eb4ddede266df8f181f578732bb01742c3fd6 38389eaa4db192648916464b60f6086d6bbaa6de < efe544462fc0b499725364f90bd0f8bbf16f861a 38389eaa4db192648916464b60f6086d6bbaa6de < 4104b0023ff66b5df900d23dbf38310893deca79 38389eaa4db192648916464b60f6086d6bbaa6de < 975355faba56c0751292ed15a90c3e2c7dc0aad6 38389eaa4db192648916464b60f6086d6bbaa6de < 13a52f6c9ff99f7d88f81da535cb4e85eade662b 38389eaa4db192648916464b60f6086d6bbaa6de < 9ab20fec7a1ce3057ad86afd27bfd08420b7cd11 38389eaa4db192648916464b60f6086d6bbaa6de < 25655580136de59ec89f09089dd28008ea440fc9
Linux / Linux
5.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/461eb4ddede266df8f181f578732bb01742c3fd6 git.kernel.org: https://git.kernel.org/stable/c/efe544462fc0b499725364f90bd0f8bbf16f861a git.kernel.org: https://git.kernel.org/stable/c/4104b0023ff66b5df900d23dbf38310893deca79 git.kernel.org: https://git.kernel.org/stable/c/975355faba56c0751292ed15a90c3e2c7dc0aad6 git.kernel.org: https://git.kernel.org/stable/c/13a52f6c9ff99f7d88f81da535cb4e85eade662b git.kernel.org: https://git.kernel.org/stable/c/9ab20fec7a1ce3057ad86afd27bfd08420b7cd11 git.kernel.org: https://git.kernel.org/stable/c/25655580136de59ec89f09089dd28008ea440fc9 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html