CVE-2025-68253
Description
In the Linux kernel, the following vulnerability has been resolved:
mm: don't spin in add_stack_record when gfp flags don't allow
syzbot was able to find the following path: add_stack_record_to_list mm/page_owner.c:182 [inline] inc_stack_record_count mm/page_owner.c:214 [inline] __set_page_owner+0x2c3/0x4a0 mm/page_owner.c:333 set_page_owner include/linux/page_owner.h:32 [inline] post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851 prep_new_page mm/page_alloc.c:1859 [inline] get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858 alloc_pages_nolock_noprof+0x94/0x120 mm/page_alloc.c:7554
Don't spin in add_stack_record_to_list() when it is called from *_nolock() context.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A spinlock deadlock in Linux kernel's page_owner when called from atomic context, fixed by not spinning in add_stack_record_to_list.
Vulnerability
In the Linux kernel, the add_stack_record_to_list() function in mm/page_owner.c could spin indefinitely when called from a context that does not allow sleeping or spinning, such as *_nolock() allocator paths. This occurs because inc_stack_record_count() invokes add_stack_record_to_list() which tries to acquire a spinlock without checking whether the current context permits blocking, leading to potential deadlocks or hangs [1].
Exploitation
The vulnerability is triggered during page allocation when __set_page_owner() is called from post_alloc_hook(), which itself is invoked via the alloc_pages_nolock_noprof() path. An attacker would need to be able to trigger memory allocation in such a way that the page allocation occurs from an atomic or non-sleepable context, potentially through crafted system calls or by exploiting other subsystems that lead to this code path [1].
Impact
If exploited, an attacker could cause a denial-of-service condition by causing the kernel to hang or deadlock, as the spinlock acquisition in add_stack_record_to_list() will never succeed if the lock is held and the context cannot wait. This can result in system unresponsiveness or crash [1].
Mitigation
The fix, included in Linux kernel stable commits, ensures that add_stack_record_to_list() does not spin when the GFP flags indicate that sleeping or spinning is not allowed. Users should apply the latest kernel updates from their distribution or the mainline kernel to address this issue [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.