๐Ÿ” CVE Alert

CVE-2026-23217

UNKNOWN 0.0

riscv: trace: fix snapshot deadlock with sbi ecall

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: riscv: trace: fix snapshot deadlock with sbi ecall If sbi_ecall.c's functions are traceable, echo "__sbi_ecall:snapshot" > /sys/kernel/tracing/set_ftrace_filter may get the kernel into a deadlock. (Functions in sbi_ecall.c are excluded from tracing if CONFIG_RISCV_ALTERNATIVE_EARLY is set.) __sbi_ecall triggers a snapshot of the ringbuffer. The snapshot code raises an IPI interrupt, which results in another call to __sbi_ecall and another snapshot... All it takes to get into this endless loop is one initial __sbi_ecall. On RISC-V systems without SSTC extension, the clock events in timer-riscv.c issue periodic sbi ecalls, making the problem easy to trigger. Always exclude the sbi_ecall.c functions from tracing to fix the potential deadlock. sbi ecalls can easiliy be logged via trace events, excluding ecall functions from function tracing is not a big limitation.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Feb 18, 2026
Last Updated Feb 20, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1ff95eb2bebda50c4c5406caaf201e0fcb24cc8f < b1f8285bc8e3508c1fde23b5205f1270215d4984 1ff95eb2bebda50c4c5406caaf201e0fcb24cc8f < b0d7f5f0c9f05f1b6d4ee7110f15bef9c11f9df0 82f134ddd4f5da11c277bd1aa02e2a733179725a
Linux / Linux
6.11

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/b1f8285bc8e3508c1fde23b5205f1270215d4984 git.kernel.org: https://git.kernel.org/stable/c/b0d7f5f0c9f05f1b6d4ee7110f15bef9c11f9df0