[PATCH] RISC-V: KVM: Fix TOCTOU race in SBI system suspend handler
Andrew Jones
andrew.jones at oss.qualcomm.com
Thu May 21 16:47:26 PDT 2026
On Thu, May 21, 2026 at 02:20:30PM +0000, Jiakai Xu wrote:
> The SBI SUSP handler kvm_sbi_ext_susp_handler() checks that all other
> vCPUs are stopped before entering system suspend, but it does not hold
> mp_state_lock during the iteration. A concurrent HSM HART_START from
> another vCPU can start a target vCPU after the SUSP handler has already
> checked it, violating the invariant that all vCPUs must be stopped
> before suspend.
>
> Fix this with a two-phase approach:
> 1. Set a VM-wide suspend_in_progress flag before the iteration to block
> concurrent HSM HART_START. The HSM start handler checks this flag
> under its existing mp_state_lock, closing the race.
> 2. Hold mp_state_lock during each per-vCPU stopped check so that
> mp_state reads are ordered against concurrent power_on/power_off
> writes on the other side of the lock.
>
> The flag is self-clearing: it resets when any vCPU re-enters
> kvm_arch_vcpu_ioctl_run after the suspend-resume cycle completes.
>
> Fixes: 023c15151fbb ("RISC-V: KVM: Add SBI system suspend support")
> Signed-off-by: Jiakai Xu <jiakaiPeanut at gmail.com>
> Signed-off-by: Jiakai Xu <xujiakai2025 at iscas.ac.cn>
> Assisted-by: YuanSheng:DeepSeek-V3.2
> ---
> arch/riscv/include/asm/kvm_host.h | 3 +++
> arch/riscv/kvm/vcpu.c | 8 ++++++++
> arch/riscv/kvm/vcpu_sbi_hsm.c | 11 +++++++++++
> arch/riscv/kvm/vcpu_sbi_system.c | 10 ++++++++++
> 4 files changed, 32 insertions(+)
>
> diff --git a/arch/riscv/include/asm/kvm_host.h b/arch/riscv/include/asm/kvm_host.h
> index 75b0a951c1bc6..c4e710ec40f90 100644
> --- a/arch/riscv/include/asm/kvm_host.h
> +++ b/arch/riscv/include/asm/kvm_host.h
> @@ -93,6 +93,9 @@ struct kvm_arch {
>
> /* KVM_CAP_RISCV_MP_STATE_RESET */
> bool mp_state_reset;
> +
> + /* Set by SBI SUSP to block concurrent HSM HART_START during system suspend */
> + bool suspend_in_progress;
> };
>
> struct kvm_cpu_trap {
> diff --git a/arch/riscv/kvm/vcpu.c b/arch/riscv/kvm/vcpu.c
> index a73690eda84b5..ea6f14244addb 100644
> --- a/arch/riscv/kvm/vcpu.c
> +++ b/arch/riscv/kvm/vcpu.c
> @@ -838,6 +838,14 @@ int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu)
> /* Mark this VCPU ran at least once */
> vcpu->arch.ran_atleast_once = true;
>
> + /*
> + * Clear stale suspend flag from a previous suspend-resume cycle.
> + * The flag was set by kvm_sbi_ext_susp_handler() and persists
> + * across the userspace exit; clearing it here ensures subsequent
> + * HSM HART_START operations are not blocked after resume.
> + */
> + WRITE_ONCE(vcpu->kvm->arch.suspend_in_progress, false);
> +
> kvm_vcpu_srcu_read_lock(vcpu);
>
> switch (run->exit_reason) {
> diff --git a/arch/riscv/kvm/vcpu_sbi_hsm.c b/arch/riscv/kvm/vcpu_sbi_hsm.c
> index f26207f84bab6..2f88d93768bc8 100644
> --- a/arch/riscv/kvm/vcpu_sbi_hsm.c
> +++ b/arch/riscv/kvm/vcpu_sbi_hsm.c
> @@ -31,6 +31,17 @@ static int kvm_sbi_hsm_vcpu_start(struct kvm_vcpu *vcpu)
> goto out;
> }
>
> + /*
> + * Reject HART_START while a system suspend is in progress.
> + * kvm_sbi_ext_susp_handler() sets this flag before checking
> + * that all vCPUs are stopped; checking it here under
> + * mp_state_lock closes the race.
> + */
> + if (READ_ONCE(target_vcpu->kvm->arch.suspend_in_progress)) {
> + ret = SBI_ERR_DENIED;
> + goto out;
> + }
> +
> kvm_riscv_vcpu_sbi_request_reset(target_vcpu, cp->a1, cp->a2);
>
> __kvm_riscv_vcpu_power_on(target_vcpu);
> diff --git a/arch/riscv/kvm/vcpu_sbi_system.c b/arch/riscv/kvm/vcpu_sbi_system.c
> index c6f7e609ac794..b79c1cff7a996 100644
> --- a/arch/riscv/kvm/vcpu_sbi_system.c
> +++ b/arch/riscv/kvm/vcpu_sbi_system.c
> @@ -35,13 +35,23 @@ static int kvm_sbi_ext_susp_handler(struct kvm_vcpu *vcpu, struct kvm_run *run,
> return 0;
> }
>
> + /*
> + * Set the VM-wide flag to block concurrent HSM HART_START
> + * from racing with the per-vCPU stopped checks below.
> + */
> + WRITE_ONCE(vcpu->kvm->arch.suspend_in_progress, true);
> +
> kvm_for_each_vcpu(i, tmp, vcpu->kvm) {
> if (tmp == vcpu)
> continue;
> + spin_lock(&tmp->arch.mp_state_lock);
> if (!kvm_riscv_vcpu_stopped(tmp)) {
> + spin_unlock(&tmp->arch.mp_state_lock);
> + WRITE_ONCE(vcpu->kvm->arch.suspend_in_progress, false);
> retdata->err_val = SBI_ERR_DENIED;
> return 0;
> }
> + spin_unlock(&tmp->arch.mp_state_lock);
> }
>
> kvm_riscv_vcpu_sbi_request_reset(vcpu, cp->a1, cp->a2);
> --
> 2.34.1
>
I'm not a big fan of this approach and I see sashiko found it has gaps[1].
I'd rather we introduce a mutex to kvm_arch to serialize cross-vcpu
mp-state operations. So it'd be taken in SUSP, HART_START, and also SRST
(anywhere that reads or modifies another vcpu's mp-state). Operations that
only modify the calling vcpu's own state would still only use the per-vcpu
mp_state_lock.
[1] https://sashiko.dev/#/patchset/20260521142030.1560861-1-xujiakai2025%40iscas.ac.cn
Thanks,
drew
More information about the linux-riscv
mailing list