CVE-2026-43385
RCU Stall in Linux Kernel Threaded Busypoll
Publication date: 2026-05-08
Last updated on: 2026-05-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux_kernel | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is related to the Linux kernel's network subsystem, specifically involving the threaded busypoll feature. When threaded busypoll is enabled, a component called bpftrace hangs during startup due to a stall in the rcu_tasks mechanism. The issue arises because the main loop runs in napi_threaded_poll instead of napi_threaded_poll_loop, which rarely iterates more than once. This causes the last_qs timestamp to reset incorrectly, preventing the system from properly reporting quiescent states and leading to a stall.
The fix involves changing how last_qs is saved in the outer napi_threaded_poll function, ensuring it is not reset on each invocation of napi_threaded_poll_loop during busypoll. This prevents the rcu_tasks stall and the associated hangs.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel's network polling mechanism to stall, which may lead to system hangs or degraded performance when using threaded busypoll. Specifically, tools like bpftrace that rely on this mechanism may hang during startup, potentially impacting network driver debugging or monitoring tasks.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing system logs for specific RCU (Read-Copy-Update) task stall messages related to threaded busypoll in the Linux kernel.
- Check the kernel log (dmesg) for messages like 'rcu_tasks_wait_gp: rcu_tasks grace period number ... is ... jiffies old.'
- Look for INFO messages indicating 'rcu_tasks detected stalls on tasks' with task names such as 'napi/eth2-8265' or similar.
- Example command to check kernel logs: `dmesg | grep rcu_tasks_wait_gp`
- Monitor for hangs or stalls in tools like bpftrace when threaded busypoll is enabled.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is related to the threaded busypoll feature in the Linux kernel causing RCU task stalls. Immediate mitigation steps include:
- Disable threaded busypoll if it is enabled, to avoid the conditions causing the RCU task stall.
- Apply the patch or update the Linux kernel to a version where this issue is fixed, as described in the CVE.
- Monitor system logs for RCU stall messages and avoid running workloads that trigger the issue until patched.