{"id":"CVE-2025-22010","summary":"RDMA/hns: Fix soft lockup during bt pages loop","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/hns: Fix soft lockup during bt pages loop\n\nDriver runs a for-loop when allocating bt pages and mapping them with\nbuffer pages. When a large buffer (e.g. MR over 100GB) is being allocated,\nit may require a considerable loop count. This will lead to soft lockup:\n\n        watchdog: BUG: soft lockup - CPU#27 stuck for 22s!\n        ...\n        Call trace:\n         hem_list_alloc_mid_bt+0x124/0x394 [hns_roce_hw_v2]\n         hns_roce_hem_list_request+0xf8/0x160 [hns_roce_hw_v2]\n         hns_roce_mtr_create+0x2e4/0x360 [hns_roce_hw_v2]\n         alloc_mr_pbl+0xd4/0x17c [hns_roce_hw_v2]\n         hns_roce_reg_user_mr+0xf8/0x190 [hns_roce_hw_v2]\n         ib_uverbs_reg_mr+0x118/0x290\n\n        watchdog: BUG: soft lockup - CPU#35 stuck for 23s!\n        ...\n        Call trace:\n         hns_roce_hem_list_find_mtt+0x7c/0xb0 [hns_roce_hw_v2]\n         mtr_map_bufs+0xc4/0x204 [hns_roce_hw_v2]\n         hns_roce_mtr_create+0x31c/0x3c4 [hns_roce_hw_v2]\n         alloc_mr_pbl+0xb0/0x160 [hns_roce_hw_v2]\n         hns_roce_reg_user_mr+0x108/0x1c0 [hns_roce_hw_v2]\n         ib_uverbs_reg_mr+0x120/0x2bc\n\nAdd a cond_resched() to fix soft lockup during these loops. In order not\nto affect the allocation performance of normal-size buffer, set the loop\ncount of a 100GB MR as the threshold to call cond_resched().","modified":"2026-04-16T04:31:22.919924003Z","published":"2025-04-08T08:18:00.430Z","related":["SUSE-SU-2025:01600-1","SUSE-SU-2025:01614-1","SUSE-SU-2025:01707-1","SUSE-SU-2025:01919-1","SUSE-SU-2025:01951-1","SUSE-SU-2025:01964-1","SUSE-SU-2025:01967-1","SUSE-SU-2025:20192-1","SUSE-SU-2025:20206-1","SUSE-SU-2025:20270-1","SUSE-SU-2025:20283-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/22xxx/CVE-2025-22010.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/13a52f6c9ff99f7d88f81da535cb4e85eade662b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/25655580136de59ec89f09089dd28008ea440fc9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4104b0023ff66b5df900d23dbf38310893deca79"},{"type":"WEB","url":"https://git.kernel.org/stable/c/461eb4ddede266df8f181f578732bb01742c3fd6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/975355faba56c0751292ed15a90c3e2c7dc0aad6"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9ab20fec7a1ce3057ad86afd27bfd08420b7cd11"},{"type":"WEB","url":"https://git.kernel.org/stable/c/efe544462fc0b499725364f90bd0f8bbf16f861a"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/22xxx/CVE-2025-22010.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-22010"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"38389eaa4db192648916464b60f6086d6bbaa6de"},{"fixed":"461eb4ddede266df8f181f578732bb01742c3fd6"},{"fixed":"efe544462fc0b499725364f90bd0f8bbf16f861a"},{"fixed":"4104b0023ff66b5df900d23dbf38310893deca79"},{"fixed":"975355faba56c0751292ed15a90c3e2c7dc0aad6"},{"fixed":"13a52f6c9ff99f7d88f81da535cb4e85eade662b"},{"fixed":"9ab20fec7a1ce3057ad86afd27bfd08420b7cd11"},{"fixed":"25655580136de59ec89f09089dd28008ea440fc9"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-22010.json"}}],"schema_version":"1.7.5"}