{"id":"CVE-2025-71235","summary":"scsi: qla2xxx: Delay module unload while fabric scan in progress","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Delay module unload while fabric scan in progress\n\nSystem crash seen during load/unload test in a loop.\n\n[105954.384919] RBP: ffff914589838dc0 R08: 0000000000000000 R09: 0000000000000086\n[105954.384920] R10: 000000000000000f R11: ffffa31240904be5 R12: ffff914605f868e0\n[105954.384921] R13: ffff914605f86910 R14: 0000000000008010 R15: 00000000ddb7c000\n[105954.384923] FS:  0000000000000000(0000) GS:ffff9163fec40000(0000) knlGS:0000000000000000\n[105954.384925] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[105954.384926] CR2: 000055d31ce1d6a0 CR3: 0000000119f5e001 CR4: 0000000000770ee0\n[105954.384928] PKRU: 55555554\n[105954.384929] Call Trace:\n[105954.384931]  \u003cIRQ\u003e\n[105954.384934]  qla24xx_sp_unmap+0x1f3/0x2a0 [qla2xxx]\n[105954.384962]  ? qla_async_scan_sp_done+0x114/0x1f0 [qla2xxx]\n[105954.384980]  ? qla24xx_els_ct_entry+0x4de/0x760 [qla2xxx]\n[105954.384999]  ? __wake_up_common+0x80/0x190\n[105954.385004]  ? qla24xx_process_response_queue+0xc2/0xaa0 [qla2xxx]\n[105954.385023]  ? qla24xx_msix_rsp_q+0x44/0xb0 [qla2xxx]\n[105954.385040]  ? __handle_irq_event_percpu+0x3d/0x190\n[105954.385044]  ? handle_irq_event+0x58/0xb0\n[105954.385046]  ? handle_edge_irq+0x93/0x240\n[105954.385050]  ? __common_interrupt+0x41/0xa0\n[105954.385055]  ? common_interrupt+0x3e/0xa0\n[105954.385060]  ? asm_common_interrupt+0x22/0x40\n\nThe root cause of this was that there was a free (dma_free_attrs) in the\ninterrupt context.  There was a device discovery/fabric scan in\nprogress.  A module unload was issued which set the UNLOADING flag.  As\npart of the discovery, after receiving an interrupt a work queue was\nscheduled (which involved a work to be queued).  Since the UNLOADING\nflag is set, the work item was not allocated and the mapped memory had\nto be freed.  The free occurred in interrupt context leading to system\ncrash.  Delay the driver unload until the fabric scan is complete to\navoid the crash.","modified":"2026-04-28T18:29:33.446617214Z","published":"2026-02-18T14:53:20.222Z","related":["SUSE-SU-2026:0962-1","SUSE-SU-2026:1081-1","SUSE-SU-2026:20667-1","SUSE-SU-2026:20720-1","SUSE-SU-2026:20838-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1","SUSE-SU-2026:20931-1","SUSE-SU-2026:21284-1","openSUSE-SU-2026:10387-1","openSUSE-SU-2026:20416-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71235.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/528b2f1027edfb52af0171f0f4b227fb356dde05"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7062eb0c488f35730334daad9495d9265c574853"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8890bf450e0b6b283f48ac619fca5ac2f14ddd62"},{"type":"WEB","url":"https://git.kernel.org/stable/c/891f9969a29e9767a453cef4811c8d2472ccab49"},{"type":"WEB","url":"https://git.kernel.org/stable/c/984dc1a51bf6fc3ca4e726abe790ec38952935d8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c068ebbaf52820d6bdefb9b405a1e426663c635a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d70f71d4c92bcb8b6a21ac62d4ea3e87721f4f32"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d8af012f92eee021c6ebb7093e65813c926c336b"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71235.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-71235"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"783e0dc4f66ade6bbd8833b6bae778158d54c1a6"},{"fixed":"d8af012f92eee021c6ebb7093e65813c926c336b"},{"fixed":"891f9969a29e9767a453cef4811c8d2472ccab49"},{"fixed":"984dc1a51bf6fc3ca4e726abe790ec38952935d8"},{"fixed":"528b2f1027edfb52af0171f0f4b227fb356dde05"},{"fixed":"d70f71d4c92bcb8b6a21ac62d4ea3e87721f4f32"},{"fixed":"c068ebbaf52820d6bdefb9b405a1e426663c635a"},{"fixed":"7062eb0c488f35730334daad9495d9265c574853"},{"fixed":"8890bf450e0b6b283f48ac619fca5ac2f14ddd62"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-71235.json"}}],"schema_version":"1.7.5"}