CVE-2026-23287 PUBLISHED

irqchip/sifive-plic: Fix frozen interrupt due to affinity setting

Assigner: Linux
Reserved: 13.01.2026 Published: 25.03.2026 Updated: 25.03.2026

In the Linux kernel, the following vulnerability has been resolved:

irqchip/sifive-plic: Fix frozen interrupt due to affinity setting

PLIC ignores interrupt completion message for disabled interrupt, explained by the specification:

<pre>The PLIC signals it has completed executing an interrupt handler by writing the interrupt ID it received from the claim to the claim/complete register. The PLIC does not check whether the completion ID is the same as the last claim ID for that target. If the completion ID does not match an interrupt source that is currently enabled for the target, the completion is silently ignored. </pre>

This caused problems in the past, because an interrupt can be disabled while still being handled and plic_irq_eoi() had no effect. That was fixed by checking if the interrupt is disabled, and if so enable it, before sending the completion message. That check is done with irqd_irq_disabled().

However, that is not sufficient because the enable bit for the handling hart can be zero despite irqd_irq_disabled(d) being false. This can happen when affinity setting is changed while a hart is still handling the interrupt.

This problem is easily reproducible by dumping a large file to uart (which generates lots of interrupts) and at the same time keep changing the uart interrupt's affinity setting. The uart port becomes frozen almost instantaneously.

Fix this by checking PLIC's enable bit instead of irqd_irq_disabled().

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from cc9f04f9a84f745949e325661550ed14bd0ff322 to 8942fb1a5bc2dcbd88f7e656d109d42f778f298f (excl.)
  • affected from cc9f04f9a84f745949e325661550ed14bd0ff322 to 2edbd173309165d103be6c73bd83e459dc45ae7b (excl.)
  • affected from cc9f04f9a84f745949e325661550ed14bd0ff322 to 686eb378a4a51aa967e08337dd59daade16aec0f (excl.)
  • affected from cc9f04f9a84f745949e325661550ed14bd0ff322 to 1883332bf21feb8871af09daf604fc4836a76925 (excl.)
  • affected from cc9f04f9a84f745949e325661550ed14bd0ff322 to f611791a927141d05d7030607dea6372311c1413 (excl.)
  • affected from cc9f04f9a84f745949e325661550ed14bd0ff322 to 1072020685f4b81f6efad3b412cdae0bd62bb043 (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 5.1 is affected
  • unaffected from 0 to 5.1 (excl.)
  • unaffected from 6.1.167 to 6.1.* (incl.)
  • unaffected from 6.6.130 to 6.6.* (incl.)
  • unaffected from 6.12.77 to 6.12.* (incl.)
  • unaffected from 6.18.17 to 6.18.* (incl.)
  • unaffected from 6.19.7 to 6.19.* (incl.)
  • unaffected from 7.0-rc2 to * (incl.)

References