Home

Description

In the Linux kernel, the following vulnerability has been resolved: riscv: ftrace: Fixup panic by disabling preemption In RISCV, we must use an AUIPC + JALR pair to encode an immediate, forming a jump that jumps to an address over 4K. This may cause errors if we want to enable kernel preemption and remove dependency from patching code with stop_machine(). For example, if a task was switched out on auipc. And, if we changed the ftrace function before it was switched back, then it would jump to an address that has updated 11:0 bits mixing with previous XLEN:12 part. p: patched area performed by dynamic ftrace ftrace_prologue: p| REG_S ra, -SZREG(sp) p| auipc ra, 0x? ------------> preempted ... change ftrace function ... p| jalr -?(ra) <------------- switched back p| REG_L ra, -SZREG(sp) func: xxx ret

PUBLISHED Reserved 2025-10-22 | Published 2025-10-22 | Updated 2025-10-22 | Assigner Linux

Product status

Default status
unaffected

afc76b8b80112189b6f11e67e19cf58301944814 (git) before 84cfcf240f4a577733b1d98fcd2611a611612b03
affected

afc76b8b80112189b6f11e67e19cf58301944814 (git) before 20a7510e781084364691b4962de31de758194cc9
affected

afc76b8b80112189b6f11e67e19cf58301944814 (git) before 8547649981e6631328cd64f583667501ae385531
affected

Default status
affected

5.12
affected

Any version before 5.12
unaffected

6.1.23 (semver)
unaffected

6.2.3 (semver)
unaffected

6.3 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/84cfcf240f4a577733b1d98fcd2611a611612b03

git.kernel.org/...c/20a7510e781084364691b4962de31de758194cc9

git.kernel.org/...c/8547649981e6631328cd64f583667501ae385531

cve.org (CVE-2023-53694)

nvd.nist.gov (CVE-2023-53694)

Download JSON