* [PATCH AUTOSEL 6.18] riscv: trace: fix snapshot deadlock with sbi ecall
[not found] <20260112145840.724774-1-sashal@kernel.org>
@ 2026-01-12 14:58 ` Sasha Levin
2026-01-12 14:58 ` [PATCH AUTOSEL 6.18-6.12] riscv: Sanitize syscall table indexing under speculation Sasha Levin
1 sibling, 0 replies; 2+ messages in thread
From: Sasha Levin @ 2026-01-12 14:58 UTC (permalink / raw)
To: patches, stable
Cc: Martin Kaiser, Paul Walmsley, Sasha Levin, palmer, aou, bjorn,
songshuaishuai, alexghiti, kees, masahiroy, charlie, linux-riscv
From: Martin Kaiser <martin@kaiser.cx>
[ Upstream commit b0d7f5f0c9f05f1b6d4ee7110f15bef9c11f9df0 ]
If sbi_ecall.c's functions are traceable,
echo "__sbi_ecall:snapshot" > /sys/kernel/tracing/set_ftrace_filter
may get the kernel into a deadlock.
(Functions in sbi_ecall.c are excluded from tracing if
CONFIG_RISCV_ALTERNATIVE_EARLY is set.)
__sbi_ecall triggers a snapshot of the ringbuffer. The snapshot code
raises an IPI interrupt, which results in another call to __sbi_ecall
and another snapshot...
All it takes to get into this endless loop is one initial __sbi_ecall.
On RISC-V systems without SSTC extension, the clock events in
timer-riscv.c issue periodic sbi ecalls, making the problem easy to
trigger.
Always exclude the sbi_ecall.c functions from tracing to fix the
potential deadlock.
sbi ecalls can easiliy be logged via trace events, excluding ecall
functions from function tracing is not a big limitation.
Signed-off-by: Martin Kaiser <martin@kaiser.cx>
Link: https://patch.msgid.link/20251223135043.1336524-1-martin@kaiser.cx
Signed-off-by: Paul Walmsley <pjw@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
---
LLM Generated explanations, may be completely bogus:
# Commit Analysis: riscv: trace: fix snapshot deadlock with sbi ecall
## 1. COMMIT MESSAGE ANALYSIS
The commit message clearly describes:
- **Problem**: A deadlock occurs when sbi_ecall.c functions are
traceable and a snapshot is triggered
- **Root cause**: `__sbi_ecall` triggers a ringbuffer snapshot → raises
IPI interrupt → causes another `__sbi_ecall` → triggers another
snapshot → endless loop
- **Trigger condition**: Easy to hit on RISC-V systems without SSTC
extension, where timer-riscv.c issues periodic SBI ecalls
- **Keywords**: "deadlock", "fix" - strong indicators of a bug fix
The commit message provides a clear technical explanation of the bug
mechanism.
## 2. CODE CHANGE ANALYSIS
Looking at the diff carefully:
**Before the patch:**
- `sbi_ecall.o` was only excluded from ftrace when
`CONFIG_RISCV_ALTERNATIVE_EARLY` was set
- This left a gap where systems without that config option could hit the
deadlock
**After the patch:**
- The Makefile is reorganized to consolidate all ftrace exclusions
- `CFLAGS_REMOVE_sbi_ecall.o = $(CC_FLAGS_FTRACE)` is now placed in an
unconditional `ifdef CONFIG_FTRACE` block
- This means sbi_ecall.o is **always** excluded from tracing when ftrace
is enabled
The fix is purely a build-time configuration change - it tells the
compiler to not instrument sbi_ecall.c with ftrace hooks.
## 3. CLASSIFICATION
- **Type**: Bug fix (deadlock prevention)
- **Nature**: Build configuration change, not runtime code
- **Not a feature**: It's restricting what can be traced, not adding
functionality
## 4. SCOPE AND RISK ASSESSMENT
- **Size**: Very small - reorganizes Makefile, effectively moves one
line
- **Files touched**: 1 file (arch/riscv/kernel/Makefile)
- **Subsystem**: RISC-V architecture specific
- **Risk**: **LOW**
- Build-time only change
- Only affects what functions can be traced
- Commit notes that SBI ecalls can still be logged via trace events
- No runtime behavior change beyond preventing the tracing of these
functions
## 5. USER IMPACT
- **Severity**: **HIGH** - This is a deadlock that can completely hang
the system
- **Affected systems**: RISC-V users with ftrace enabled and without
CONFIG_RISCV_ALTERNATIVE_EARLY
- **Trigger likelihood**: Easy to trigger on systems without SSTC
extension (common scenario)
- **User action that triggers it**: Using ftrace snapshot on sbi_ecall
functions
## 6. STABILITY INDICATORS
- Properly signed off by author and RISC-V maintainer (Paul Walmsley)
- Has a Link: to the patch discussion
- Clear, detailed commit message explaining the issue
## 7. DEPENDENCY CHECK
This is a self-contained Makefile change. The only dependency is that:
- The stable tree has RISC-V architecture support with sbi_ecall.c
- The Makefile structure is similar enough for the patch to apply
The core concept (excluding sbi_ecall.o from ftrace) is simple and
applicable to any kernel version with this file.
## STABLE KERNEL RULES ASSESSMENT
| Criterion | Assessment |
|-----------|------------|
| Obviously correct | ✅ Yes - simple Makefile change to exclude a file
from tracing |
| Fixes real bug | ✅ Yes - fixes a deadlock |
| Important issue | ✅ Yes - deadlock = system hang |
| Small and contained | ✅ Yes - 1 file, Makefile only |
| No new features | ✅ Yes - restricts functionality, doesn't add any |
| Tested | ✅ Merged via maintainer tree |
## RISK VS BENEFIT
- **Benefit**: Prevents a system deadlock on RISC-V platforms
- **Risk**: Minimal - users cannot trace sbi_ecall functions (workaround
exists via trace events)
- **Trade-off**: Clearly favorable - preventing deadlocks is worth
losing ability to trace a few functions
## CONCERNS FOR BACKPORTING
The Makefile structure may differ slightly in older stable kernels. The
patch may need minor adjustment but the concept is simple: ensure
`CFLAGS_REMOVE_sbi_ecall.o = $(CC_FLAGS_FTRACE)` is set unconditionally
when CONFIG_FTRACE is enabled.
## CONCLUSION
This is an excellent candidate for stable backporting:
1. Fixes a real, easily-triggerable deadlock
2. Small, surgical fix to build configuration
3. Low risk - only prevents tracing of a few functions
4. Self-contained with no dependencies on other patches
5. Meets all stable kernel rules
**YES**
arch/riscv/kernel/Makefile | 15 ++++++++-------
1 file changed, 8 insertions(+), 7 deletions(-)
diff --git a/arch/riscv/kernel/Makefile b/arch/riscv/kernel/Makefile
index f60fce69b7259..a01f6439d62b1 100644
--- a/arch/riscv/kernel/Makefile
+++ b/arch/riscv/kernel/Makefile
@@ -3,12 +3,6 @@
# Makefile for the RISC-V Linux kernel
#
-ifdef CONFIG_FTRACE
-CFLAGS_REMOVE_ftrace.o = $(CC_FLAGS_FTRACE)
-CFLAGS_REMOVE_patch.o = $(CC_FLAGS_FTRACE)
-CFLAGS_REMOVE_sbi.o = $(CC_FLAGS_FTRACE)
-CFLAGS_REMOVE_return_address.o = $(CC_FLAGS_FTRACE)
-endif
CFLAGS_syscall_table.o += $(call cc-disable-warning, override-init)
CFLAGS_compat_syscall_table.o += $(call cc-disable-warning, override-init)
@@ -24,7 +18,6 @@ CFLAGS_sbi_ecall.o := -mcmodel=medany
ifdef CONFIG_FTRACE
CFLAGS_REMOVE_alternative.o = $(CC_FLAGS_FTRACE)
CFLAGS_REMOVE_cpufeature.o = $(CC_FLAGS_FTRACE)
-CFLAGS_REMOVE_sbi_ecall.o = $(CC_FLAGS_FTRACE)
endif
ifdef CONFIG_RELOCATABLE
CFLAGS_alternative.o += -fno-pie
@@ -43,6 +36,14 @@ CFLAGS_sbi_ecall.o += -D__NO_FORTIFY
endif
endif
+ifdef CONFIG_FTRACE
+CFLAGS_REMOVE_ftrace.o = $(CC_FLAGS_FTRACE)
+CFLAGS_REMOVE_patch.o = $(CC_FLAGS_FTRACE)
+CFLAGS_REMOVE_sbi.o = $(CC_FLAGS_FTRACE)
+CFLAGS_REMOVE_return_address.o = $(CC_FLAGS_FTRACE)
+CFLAGS_REMOVE_sbi_ecall.o = $(CC_FLAGS_FTRACE)
+endif
+
always-$(KBUILD_BUILTIN) += vmlinux.lds
obj-y += head.o
--
2.51.0
_______________________________________________
linux-riscv mailing list
linux-riscv@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-riscv
^ permalink raw reply related [flat|nested] 2+ messages in thread
* [PATCH AUTOSEL 6.18-6.12] riscv: Sanitize syscall table indexing under speculation
[not found] <20260112145840.724774-1-sashal@kernel.org>
2026-01-12 14:58 ` [PATCH AUTOSEL 6.18] riscv: trace: fix snapshot deadlock with sbi ecall Sasha Levin
@ 2026-01-12 14:58 ` Sasha Levin
1 sibling, 0 replies; 2+ messages in thread
From: Sasha Levin @ 2026-01-12 14:58 UTC (permalink / raw)
To: patches, stable
Cc: Lukas Gerlach, Paul Walmsley, Sasha Levin, palmer, aou, alexghiti,
cleger, namcao, linux-riscv
From: Lukas Gerlach <lukas.gerlach@cispa.de>
[ Upstream commit 25fd7ee7bf58ac3ec7be3c9f82ceff153451946c ]
The syscall number is a user-controlled value used to index into the
syscall table. Use array_index_nospec() to clamp this value after the
bounds check to prevent speculative out-of-bounds access and subsequent
data leakage via cache side channels.
Signed-off-by: Lukas Gerlach <lukas.gerlach@cispa.de>
Link: https://patch.msgid.link/20251218191332.35849-3-lukas.gerlach@cispa.de
Signed-off-by: Paul Walmsley <pjw@kernel.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
---
LLM Generated explanations, may be completely bogus:
## Commit Analysis: riscv: Sanitize syscall table indexing under
speculation
### 1. COMMIT MESSAGE ANALYSIS
The commit message clearly describes a **security vulnerability fix**:
- User-controlled syscall numbers are used to index into the syscall
table
- The fix prevents speculative out-of-bounds access
- Addresses data leakage via cache side channels (Spectre v1-style
attack)
Key indicators: "speculative out-of-bounds access", "data leakage",
"cache side channels" - these are unmistakable security vulnerability
descriptions.
### 2. CODE CHANGE ANALYSIS
The change is minimal and surgical:
```c
- if (syscall >= 0 && syscall < NR_syscalls)
+ if (syscall >= 0 && syscall < NR_syscalls) {
+ syscall = array_index_nospec(syscall,
NR_syscalls);
syscall_handler(regs, syscall);
+ }
```
**Technical mechanism:**
- The bounds check (`syscall >= 0 && syscall < NR_syscalls`) is
performed at runtime
- However, speculative execution can bypass this check - the CPU may
speculatively execute `syscall_handler()` with an out-of-bounds index
before the branch is resolved
- This speculative access leaves traces in the cache that can be
measured via timing attacks
- `array_index_nospec()` creates a data dependency that architecturally
clamps the index, preventing speculative OOB access
This is the standard Spectre v1 (bounds check bypass) mitigation pattern
used extensively throughout the kernel since 2018.
### 3. CLASSIFICATION
**Type:** Security fix (speculative execution side-channel
vulnerability)
This is NOT:
- A new feature
- A code cleanup
- An optimization
- A refactoring
This IS a security hardening fix addressing a well-known class of
vulnerabilities.
### 4. SCOPE AND RISK ASSESSMENT
**Size:** 2 lines of actual code change
**Files:** 1 file (arch/riscv/kernel/traps.c)
**Complexity:** Extremely low - standard pattern
**Risk analysis:**
- `array_index_nospec()` is a mature, battle-tested macro available
since kernel 4.16+
- The logic flow is identical - only adds speculation barrier
- No functional behavior change
- Zero regression risk - this is purely defensive
### 5. USER IMPACT
**Affected users:** All RISC-V kernel users
**Severity:** High - this is a security vulnerability:
- Allows potential kernel memory disclosure via timing side-channels
- Spectre-class vulnerabilities have resulted in numerous CVEs
- The syscall path is one of the most critical attack surfaces (user →
kernel transition)
**Real-world impact:** While exploitation requires sophistication,
Spectre attacks are well-documented and actively exploited. This
vulnerability class affects every major cloud provider and is taken very
seriously.
### 6. STABILITY INDICATORS
- Authored by researcher from CISPA (Helmholtz Center for Information
Security)
- Signed-off by Paul Walmsley (RISC-V maintainer)
- Follows established kernel security patterns
- Other architectures (x86, ARM64) already have equivalent protections
### 7. DEPENDENCY CHECK
**`array_index_nospec()`:** This macro has been in the kernel since
early 2018 (v4.16) for Spectre mitigations. It will be present in all
maintained stable trees.
**Code context:** The `do_trap_ecall_u()` function in
`arch/riscv/kernel/traps.c` is a fundamental part of the RISC-V syscall
handling and exists in all stable trees supporting RISC-V.
No other commits are required as dependencies.
### STABLE KERNEL RULES ASSESSMENT
| Criteria | Assessment |
|----------|------------|
| Obviously correct | ✅ Uses standard kernel pattern |
| Fixes real bug | ✅ Security vulnerability |
| Important issue | ✅ Information disclosure via side-channel |
| Small and contained | ✅ 2 lines, 1 file |
| No new features | ✅ Pure security hardening |
| Can apply cleanly | ✅ Self-contained change |
### CONCLUSION
This is an exemplary stable backport candidate:
1. **Security fix** for a Spectre v1-class vulnerability in the RISC-V
syscall path
2. **Minimal change** - 2 lines using well-established kernel security
primitives
3. **Zero regression risk** - no functional change, only speculation
barrier
4. **High value** - protects all RISC-V users from potential kernel
memory disclosure
5. **Brings RISC-V in line** with other architectures that already have
this protection
The fix is small, surgical, addresses a real security vulnerability,
uses a mature mitigation pattern, and has essentially no risk of causing
regressions. This meets all stable kernel criteria.
**YES**
arch/riscv/kernel/traps.c | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/arch/riscv/kernel/traps.c b/arch/riscv/kernel/traps.c
index 80230de167def..47afea4ff1a8d 100644
--- a/arch/riscv/kernel/traps.c
+++ b/arch/riscv/kernel/traps.c
@@ -339,8 +339,10 @@ void do_trap_ecall_u(struct pt_regs *regs)
add_random_kstack_offset();
- if (syscall >= 0 && syscall < NR_syscalls)
+ if (syscall >= 0 && syscall < NR_syscalls) {
+ syscall = array_index_nospec(syscall, NR_syscalls);
syscall_handler(regs, syscall);
+ }
/*
* Ultimately, this value will get limited by KSTACK_OFFSET_MAX(),
--
2.51.0
_______________________________________________
linux-riscv mailing list
linux-riscv@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-riscv
^ permalink raw reply related [flat|nested] 2+ messages in thread
end of thread, other threads:[~2026-01-12 14:59 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
[not found] <20260112145840.724774-1-sashal@kernel.org>
2026-01-12 14:58 ` [PATCH AUTOSEL 6.18] riscv: trace: fix snapshot deadlock with sbi ecall Sasha Levin
2026-01-12 14:58 ` [PATCH AUTOSEL 6.18-6.12] riscv: Sanitize syscall table indexing under speculation Sasha Levin
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox