{"id":"CVE-2023-53151","summary":"md/raid10: prevent soft lockup while flush writes","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmd/raid10: prevent soft lockup while flush writes\n\nCurrently, there is no limit for raid1/raid10 plugged bio. While flushing\nwrites, raid1 has cond_resched() while raid10 doesn't, and too many\nwrites can cause soft lockup.\n\nFollow up soft lockup can be triggered easily with writeback test for\nraid10 with ramdisks:\n\nwatchdog: BUG: soft lockup - CPU#10 stuck for 27s! [md0_raid10:1293]\nCall Trace:\n \u003cTASK\u003e\n call_rcu+0x16/0x20\n put_object+0x41/0x80\n __delete_object+0x50/0x90\n delete_object_full+0x2b/0x40\n kmemleak_free+0x46/0xa0\n slab_free_freelist_hook.constprop.0+0xed/0x1a0\n kmem_cache_free+0xfd/0x300\n mempool_free_slab+0x1f/0x30\n mempool_free+0x3a/0x100\n bio_free+0x59/0x80\n bio_put+0xcf/0x2c0\n free_r10bio+0xbf/0xf0\n raid_end_bio_io+0x78/0xb0\n one_write_done+0x8a/0xa0\n raid10_end_write_request+0x1b4/0x430\n bio_endio+0x175/0x320\n brd_submit_bio+0x3b9/0x9b7 [brd]\n __submit_bio+0x69/0xe0\n submit_bio_noacct_nocheck+0x1e6/0x5a0\n submit_bio_noacct+0x38c/0x7e0\n flush_pending_writes+0xf0/0x240\n raid10d+0xac/0x1ed0\n\nFix the problem by adding cond_resched() to raid10 like what raid1 did.\n\nNote that unlimited plugged bio still need to be optimized, for example,\nin the case of lots of dirty pages writeback, this will take lots of\nmemory and io will spend a long time in plug, hence io latency is bad.","modified":"2026-04-02T09:43:42.508508Z","published":"2025-09-15T14:03:19.155Z","related":["SUSE-SU-2025:03600-1","SUSE-SU-2025:03614-1","SUSE-SU-2025:03615-1","SUSE-SU-2025:03628-1","SUSE-SU-2025:03634-1","SUSE-SU-2025:20851-1","SUSE-SU-2025:20861-1","SUSE-SU-2025:20870-1","SUSE-SU-2025:20898-1","SUSE-SU-2025:3716-1","SUSE-SU-2025:3751-1","SUSE-SU-2025:3761-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4141-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53151.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/00ecb6fa67c0f772290c5ea5ae8b46eefd503b83"},{"type":"WEB","url":"https://git.kernel.org/stable/c/010444623e7f4da6b4a4dd603a7da7469981e293"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1d467e10507167eb6dc2c281a87675b731955d86"},{"type":"WEB","url":"https://git.kernel.org/stable/c/634daf6b2c81015cc5e28bf694a6a94a50c641cd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/84a578961b2566e475bfa8740beaf0abcc781a6f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d0345f7c7dbc5d42e4e6f1db99c1c1879d7b0eb5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f45b2fa7678ab385299de345f7e85d05caea386b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fbf50184190d55f8717bd29aa9530c399be96f30"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/53xxx/CVE-2023-53151.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-53151"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"6cce3b23f6f8e974c00af7a9b88f1d413ba368a8"},{"fixed":"f45b2fa7678ab385299de345f7e85d05caea386b"},{"fixed":"00ecb6fa67c0f772290c5ea5ae8b46eefd503b83"},{"fixed":"d0345f7c7dbc5d42e4e6f1db99c1c1879d7b0eb5"},{"fixed":"634daf6b2c81015cc5e28bf694a6a94a50c641cd"},{"fixed":"84a578961b2566e475bfa8740beaf0abcc781a6f"},{"fixed":"1d467e10507167eb6dc2c281a87675b731955d86"},{"fixed":"fbf50184190d55f8717bd29aa9530c399be96f30"},{"fixed":"010444623e7f4da6b4a4dd603a7da7469981e293"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-53151.json"}}],"schema_version":"1.7.5"}