{"id":"CVE-2023-54246","summary":"rcuscale: Move rcu_scale_writer() schedule_timeout_uninterruptible() to _idle()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nrcuscale: Move rcu_scale_writer() schedule_timeout_uninterruptible() to _idle()\n\nThe rcuscale.holdoff module parameter can be used to delay the start\nof rcu_scale_writer() kthread.  However, the hung-task timeout will\ntrigger when the timeout specified by rcuscale.holdoff is greater than\nhung_task_timeout_secs:\n\nrunqemu kvm nographic slirp qemuparams=\"-smp 4 -m 2048M\"\nbootparams=\"rcuscale.shutdown=0 rcuscale.holdoff=300\"\n\n[  247.071753] INFO: task rcu_scale_write:59 blocked for more than 122 seconds.\n[  247.072529]       Not tainted 6.4.0-rc1-00134-gb9ed6de8d4ff #7\n[  247.073400] \"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n[  247.074331] task:rcu_scale_write state:D stack:30144 pid:59    ppid:2      flags:0x00004000\n[  247.075346] Call Trace:\n[  247.075660]  \u003cTASK\u003e\n[  247.075965]  __schedule+0x635/0x1280\n[  247.076448]  ? __pfx___schedule+0x10/0x10\n[  247.076967]  ? schedule_timeout+0x2dc/0x4d0\n[  247.077471]  ? __pfx_lock_release+0x10/0x10\n[  247.078018]  ? enqueue_timer+0xe2/0x220\n[  247.078522]  schedule+0x84/0x120\n[  247.078957]  schedule_timeout+0x2e1/0x4d0\n[  247.079447]  ? __pfx_schedule_timeout+0x10/0x10\n[  247.080032]  ? __pfx_rcu_scale_writer+0x10/0x10\n[  247.080591]  ? __pfx_process_timeout+0x10/0x10\n[  247.081163]  ? __pfx_sched_set_fifo_low+0x10/0x10\n[  247.081760]  ? __pfx_rcu_scale_writer+0x10/0x10\n[  247.082287]  rcu_scale_writer+0x6b1/0x7f0\n[  247.082773]  ? mark_held_locks+0x29/0xa0\n[  247.083252]  ? __pfx_rcu_scale_writer+0x10/0x10\n[  247.083865]  ? __pfx_rcu_scale_writer+0x10/0x10\n[  247.084412]  kthread+0x179/0x1c0\n[  247.084759]  ? __pfx_kthread+0x10/0x10\n[  247.085098]  ret_from_fork+0x2c/0x50\n[  247.085433]  \u003c/TASK\u003e\n\nThis commit therefore replaces schedule_timeout_uninterruptible() with\nschedule_timeout_idle().","modified":"2026-04-02T09:45:42.682573Z","published":"2025-12-30T12:15:44.729Z","related":["SUSE-SU-2026:0278-1","SUSE-SU-2026:0281-1","SUSE-SU-2026:0293-1","SUSE-SU-2026:0315-1","SUSE-SU-2026:20477-1","SUSE-SU-2026:20498-1","SUSE-SU-2026:20845-1","SUSE-SU-2026:20876-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54246.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/4f03fba096bfded90e0d71eba8839a46922164d1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/55887adc76e19aec9763186e2c1d0a3481d20e96"},{"type":"WEB","url":"https://git.kernel.org/stable/c/83ed0cdb6ae0383dd14b02375c353773836884ed"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9416dccb31fdb190d25d57e97674f232651f6560"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e60c122a1614b4f65b29a7bef9d83b9fd30e937a"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54246.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-54246"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"df37e66bfdbb57e8cae7dbf39a0c66b1b8701338"},{"fixed":"55887adc76e19aec9763186e2c1d0a3481d20e96"},{"fixed":"4f03fba096bfded90e0d71eba8839a46922164d1"},{"fixed":"83ed0cdb6ae0383dd14b02375c353773836884ed"},{"fixed":"9416dccb31fdb190d25d57e97674f232651f6560"},{"fixed":"e60c122a1614b4f65b29a7bef9d83b9fd30e937a"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54246.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.7.0"},{"fixed":"5.10.197"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.133"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.55"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.5.5"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54246.json"}}],"schema_version":"1.7.5"}