CVE-2025-21657

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-21657
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-21657.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-21657
Downstream
Published
2025-01-21T12:18:13Z
Modified
2025-10-22T08:46:57.407622Z
Summary
sched_ext: Replace rq_lock() to raw_spin_rq_lock() in scx_ops_bypass()
Details

In the Linux kernel, the following vulnerability has been resolved:

schedext: Replace rqlock() to rawspinrqlock() in scxops_bypass()

scxopsbypass() iterates all CPUs to re-enqueue all the scx tasks. For each CPU, it acquires a lock using rqlock() regardless of whether a CPU is offline or the CPU is currently running a task in a higher scheduler class (e.g., deadline). The rqlock() is supposed to be used for online CPUs, and the use of rqlock() may trigger an unnecessary warning in rqpinlock(). Therefore, replace rqlock() to rawspinrqlock() in scxops_bypass().

Without this change, we observe the following warning:

===== START ===== [ 6.615205] rq->balancecallback && rq->balancecallback != &balancepushcallback [ 6.615208] WARNING: CPU: 2 PID: 0 at kernel/sched/sched.h:1730 __schedule+0x1130/0x1c90 ===== END =====

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0e7ffff1b8117b05635c87d3c9099f6aa9c9b689
Fixed
d9e446dd63cee7161717a6a8414ba9c6435af764
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0e7ffff1b8117b05635c87d3c9099f6aa9c9b689
Fixed
6268d5bc10354fc2ab8d44a0cd3b042d49a0417e

Affected versions

v6.*

v6.12
v6.12-rc1
v6.12-rc2
v6.12-rc3
v6.12-rc4
v6.12-rc5
v6.12-rc6
v6.12-rc7
v6.12.1
v6.12.2
v6.12.3
v6.12.4
v6.12.5
v6.12.6
v6.12.7
v6.12.8
v6.12.9
v6.13-rc1

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.12.0
Fixed
6.12.10