The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-22010

CVE-2025-22010: Linux Kernel RDMA/hns DoS Vulnerability

CVE-2025-22010 is a denial-of-service flaw in Linux Kernel's RDMA/hns driver causing soft lockup during large buffer allocation. This article covers the technical details, affected versions, impact, and mitigation.

Updated: January 22, 2026

CVE-2025-22010 Overview

CVE-2025-22010 is a Denial of Service vulnerability in the Linux kernel's RDMA/hns (Remote Direct Memory Access for HiSilicon Network Subsystem) driver. The vulnerability occurs during the allocation and mapping of bt (buffer table) pages with buffer pages in the hem_list_alloc_mid_bt and related functions. When allocating large memory regions (e.g., MR over 100GB), the driver enters a prolonged for-loop that fails to yield CPU time, triggering the kernel's soft lockup watchdog mechanism.

Critical Impact

This vulnerability enables local attackers to cause system availability issues by triggering soft lockups that can freeze affected CPUs for extended periods, potentially leading to system instability or denial of service conditions.

Affected Products

  • Linux Kernel versions prior to patched releases
  • Linux Kernel 6.14 Release Candidates (rc1 through rc7)
  • Systems utilizing HiSilicon RDMA network adapters with hns_roce_hw_v2 driver

Discovery Timeline

  • 2025-04-08 - CVE CVE-2025-22010 published to NVD
  • 2025-11-03 - Last updated in NVD database

Technical Details for CVE-2025-22010

Vulnerability Analysis

The vulnerability resides in the HiSilicon RDMA driver's memory management subsystem, specifically within the hardware memory (HEM) list allocation functions. When a user requests registration of a large memory region through the ib_uverbs_reg_mr interface, the kernel driver allocates and maps bt pages to buffer pages in a tight loop. For memory regions exceeding 100GB, this loop requires an extensive number of iterations without any scheduling breaks, causing the CPU to become stuck in kernel space.

The kernel's watchdog mechanism detects this condition and reports soft lockups, with observed stuck times of 22-23 seconds on affected CPUs. The call traces show the issue occurring in two related code paths: hem_list_alloc_mid_bt during allocation and hns_roce_hem_list_find_mtt during the mapping phase.

Root Cause

The root cause is a missing cond_resched() call within the for-loops responsible for bt page allocation and buffer mapping in the RDMA/hns driver. The cond_resched() function is a kernel mechanism that allows other processes to execute during long-running kernel operations, preventing the soft lockup condition. Without this cooperative scheduling point, the kernel scheduler cannot preempt the long-running loop, triggering the watchdog detector.

The fix implements cond_resched() calls within these loops, using the loop count equivalent to a 100GB MR as the threshold to trigger the reschedule. This approach maintains allocation performance for normal-sized buffers while preventing lockups during large allocations.

Attack Vector

The vulnerability requires local access to the system with the ability to interact with the RDMA subsystem through the verbs interface. An attacker would need:

  1. Local access to a system with HiSilicon RDMA hardware and the hns_roce_hw_v2 kernel module loaded
  2. Permissions to register memory regions through the InfiniBand verbs interface (ib_uverbs)
  3. The ability to request allocation of very large memory regions (100GB or more)

By submitting a memory registration request for an exceptionally large buffer through ib_uverbs_reg_mr, an attacker can trigger the soft lockup condition. While this requires local access and specific hardware, it could be exploited in multi-tenant environments where RDMA access is provided to untrusted users, or as part of a larger attack chain.

Detection Methods for CVE-2025-22010

Indicators of Compromise

  • Kernel log messages indicating "BUG: soft lockup - CPU#XX stuck for XXs!" with call traces pointing to hns_roce_hw_v2 module functions
  • System unresponsiveness or degraded performance coinciding with RDMA memory registration operations
  • Watchdog timer alerts and NMI watchdog reports in system logs
  • Elevated CPU utilization locked to 100% on specific cores during RDMA operations

Detection Strategies

  • Monitor kernel logs (dmesg, /var/log/kern.log) for soft lockup warnings referencing hem_list_alloc_mid_bt, hns_roce_hem_list_find_mtt, or hns_roce_mtr_create functions
  • Implement alerting on watchdog events that include the hns_roce_hw_v2 module in their call traces
  • Track large memory region registration requests through RDMA subsystem auditing mechanisms
  • Deploy kernel tracing (ftrace, eBPF) to monitor unusual patterns in the ib_uverbs_reg_mr path

Monitoring Recommendations

  • Enable and configure the kernel watchdog with appropriate thresholds and alerting for soft lockup detection
  • Implement resource limits on RDMA memory region sizes to prevent abuse of large allocation requests
  • Use SentinelOne's Linux agent to monitor for anomalous kernel behavior and denial of service patterns
  • Review audit logs for unusual RDMA verbs interface access patterns from non-privileged users

How to Mitigate CVE-2025-22010

Immediate Actions Required

  • Apply the kernel patches from the official Linux kernel stable branches immediately
  • Review and restrict access to RDMA subsystem interfaces to authorized applications only
  • Monitor systems for signs of exploitation while awaiting patch deployment
  • Consider temporarily limiting memory region size capabilities if patching is delayed

Patch Information

The vulnerability has been addressed through multiple commits to the Linux kernel stable branches. The fix introduces cond_resched() calls within the affected loops to allow the scheduler to preempt during large allocations. Patches are available from the official kernel git repositories:

  • Kernel Git Commit 13a52f6
  • Kernel Git Commit 2565558
  • Kernel Git Commit 4104b00
  • Kernel Git Commit 975355f
  • Kernel Git Commit 9ab20fe

Debian users should refer to Debian LTS Advisory 30 and Debian LTS Advisory 45 for distribution-specific patches.

Workarounds

  • Restrict access to the RDMA verbs interface by removing read/write permissions from /dev/infiniband/uverbs* devices for non-privileged users
  • Unload the hns_roce_hw_v2 kernel module if RDMA functionality is not required: modprobe -r hns_roce_hw_v2
  • Implement application-level limits on memory region sizes for RDMA operations where possible
  • Use cgroups or namespaces to isolate and limit resources available to untrusted workloads accessing RDMA hardware
bash
# Restrict RDMA verbs interface access
chmod 600 /dev/infiniband/uverbs*

# Unload the vulnerable module if not needed
modprobe -r hns_roce_hw_v2

# Blacklist the module to prevent auto-loading
echo "blacklist hns_roce_hw_v2" >> /etc/modprobe.d/blacklist-hns.conf

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechLinux Kernel

  • SeverityMEDIUM

  • CVSS Score5.5

  • EPSS Probability0.02%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-667
  • Technical References
  • Kernel Git Commit 461eb4d

  • Kernel Git Commit efe5444

  • Debian LTS Advisory 30

  • Debian LTS Advisory 45
  • Vendor Resources
  • Kernel Git Commit 13a52f6

  • Kernel Git Commit 2565558

  • Kernel Git Commit 4104b00

  • Kernel Git Commit 975355f

  • Kernel Git Commit 9ab20fe
  • Related CVEs
  • CVE-2026-23446: Linux Kernel aqc111 Driver DoS Vulnerability

  • CVE-2026-23451: Linux Kernel Bonding Driver DoS Flaw

  • CVE-2026-23460: Linux Kernel ROSE Protocol DoS Vulnerability

  • CVE-2026-23459: Linux Kernel DOS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English