CVE-2025-21657

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-21657
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-21657.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-21657
Downstream
Published
2025-01-21T13:15:09Z
Modified
2025-08-09T20:01:28Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

schedext: Replace rqlock() to rawspinrqlock() in scxops_bypass()

scxopsbypass() iterates all CPUs to re-enqueue all the scx tasks. For each CPU, it acquires a lock using rqlock() regardless of whether a CPU is offline or the CPU is currently running a task in a higher scheduler class (e.g., deadline). The rqlock() is supposed to be used for online CPUs, and the use of rqlock() may trigger an unnecessary warning in rqpinlock(). Therefore, replace rqlock() to rawspinrqlock() in scxops_bypass().

Without this change, we observe the following warning:

===== START ===== [ 6.615205] rq->balancecallback && rq->balancecallback != &balancepushcallback [ 6.615208] WARNING: CPU: 2 PID: 0 at kernel/sched/sched.h:1730 __schedule+0x1130/0x1c90 ===== END =====

References

Affected packages