CVE-2025-21754 (GCVE-0-2025-21754)
Vulnerability from cvelistv5
Published
2025-02-27 02:12
Modified
2025-05-04 07:20
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix assertion failure when splitting ordered extent after transaction abort If while we are doing a direct IO write a transaction abort happens, we mark all existing ordered extents with the BTRFS_ORDERED_IOERR flag (done at btrfs_destroy_ordered_extents()), and then after that if we enter btrfs_split_ordered_extent() and the ordered extent has bytes left (meaning we have a bio that doesn't cover the whole ordered extent, see details at btrfs_extract_ordered_extent()), we will fail on the following assertion at btrfs_split_ordered_extent(): ASSERT(!(flags & ~BTRFS_ORDERED_TYPE_FLAGS)); because the BTRFS_ORDERED_IOERR flag is set and the definition of BTRFS_ORDERED_TYPE_FLAGS is just the union of all flags that identify the type of write (regular, nocow, prealloc, compressed, direct IO, encoded). Fix this by returning an error from btrfs_extract_ordered_extent() if we find the BTRFS_ORDERED_IOERR flag in the ordered extent. The error will be the error that resulted in the transaction abort or -EIO if no transaction abort happened. This was recently reported by syzbot with the following trace: FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 1 CPU: 0 UID: 0 PID: 5321 Comm: syz.0.0 Not tainted 6.13.0-rc5-syzkaller #0 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 Call Trace: <TASK> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 fail_dump lib/fault-inject.c:53 [inline] should_fail_ex+0x3b0/0x4e0 lib/fault-inject.c:154 should_failslab+0xac/0x100 mm/failslab.c:46 slab_pre_alloc_hook mm/slub.c:4072 [inline] slab_alloc_node mm/slub.c:4148 [inline] __do_kmalloc_node mm/slub.c:4297 [inline] __kmalloc_noprof+0xdd/0x4c0 mm/slub.c:4310 kmalloc_noprof include/linux/slab.h:905 [inline] kzalloc_noprof include/linux/slab.h:1037 [inline] btrfs_chunk_alloc_add_chunk_item+0x244/0x1100 fs/btrfs/volumes.c:5742 reserve_chunk_space+0x1ca/0x2c0 fs/btrfs/block-group.c:4292 check_system_chunk fs/btrfs/block-group.c:4319 [inline] do_chunk_alloc fs/btrfs/block-group.c:3891 [inline] btrfs_chunk_alloc+0x77b/0xf80 fs/btrfs/block-group.c:4187 find_free_extent_update_loop fs/btrfs/extent-tree.c:4166 [inline] find_free_extent+0x42d1/0x5810 fs/btrfs/extent-tree.c:4579 btrfs_reserve_extent+0x422/0x810 fs/btrfs/extent-tree.c:4672 btrfs_new_extent_direct fs/btrfs/direct-io.c:186 [inline] btrfs_get_blocks_direct_write+0x706/0xfa0 fs/btrfs/direct-io.c:321 btrfs_dio_iomap_begin+0xbb7/0x1180 fs/btrfs/direct-io.c:525 iomap_iter+0x697/0xf60 fs/iomap/iter.c:90 __iomap_dio_rw+0xeb9/0x25b0 fs/iomap/direct-io.c:702 btrfs_dio_write fs/btrfs/direct-io.c:775 [inline] btrfs_direct_write+0x610/0xa30 fs/btrfs/direct-io.c:880 btrfs_do_write_iter+0x2a0/0x760 fs/btrfs/file.c:1397 do_iter_readv_writev+0x600/0x880 vfs_writev+0x376/0xba0 fs/read_write.c:1050 do_pwritev fs/read_write.c:1146 [inline] __do_sys_pwritev2 fs/read_write.c:1204 [inline] __se_sys_pwritev2+0x196/0x2b0 fs/read_write.c:1195 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f1281f85d29 RSP: 002b:00007f12819fe038 EFLAGS: 00000246 ORIG_RAX: 0000000000000148 RAX: ffffffffffffffda RBX: 00007f1282176080 RCX: 00007f1281f85d29 RDX: 0000000000000001 RSI: 0000000020000240 RDI: 0000000000000005 RBP: 00007f12819fe090 R08: 0000000000000000 R09: 0000000000000003 R10: 0000000000007000 R11: 0000000000000246 R12: 0000000000000002 R13: 0000000000000000 R14: 00007f1282176080 R15: 00007ffcb9e23328 </TASK> BTRFS error (device loop0 state A): Transaction aborted (error -12) BTRFS: error (device loop0 state A ---truncated---
Impacted products
Vendor Product Version
Linux Linux Version: 52b1fdca23ac0fbcad363a1a5b426bf0d56b715a
Version: 52b1fdca23ac0fbcad363a1a5b426bf0d56b715a
Version: 52b1fdca23ac0fbcad363a1a5b426bf0d56b715a
Version: 52b1fdca23ac0fbcad363a1a5b426bf0d56b715a
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "fs/btrfs/ordered-data.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "927b930f117bbae730a853c1dc43da8afe8380fa",
              "status": "affected",
              "version": "52b1fdca23ac0fbcad363a1a5b426bf0d56b715a",
              "versionType": "git"
            },
            {
              "lessThan": "0ff88c2a742a7cbaa4d08507d864737d099b435a",
              "status": "affected",
              "version": "52b1fdca23ac0fbcad363a1a5b426bf0d56b715a",
              "versionType": "git"
            },
            {
              "lessThan": "8ea8db4216d1029527ab4666f730650419451e32",
              "status": "affected",
              "version": "52b1fdca23ac0fbcad363a1a5b426bf0d56b715a",
              "versionType": "git"
            },
            {
              "lessThan": "0d85f5c2dd91df6b5da454406756f463ba923b69",
              "status": "affected",
              "version": "52b1fdca23ac0fbcad363a1a5b426bf0d56b715a",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "fs/btrfs/ordered-data.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.5"
            },
            {
              "lessThan": "6.5",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.78",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.14",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.13.*",
              "status": "unaffected",
              "version": "6.13.3",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.14",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.78",
                  "versionStartIncluding": "6.5",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.14",
                  "versionStartIncluding": "6.5",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.13.3",
                  "versionStartIncluding": "6.5",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.14",
                  "versionStartIncluding": "6.5",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix assertion failure when splitting ordered extent after transaction abort\n\nIf while we are doing a direct IO write a transaction abort happens, we\nmark all existing ordered extents with the BTRFS_ORDERED_IOERR flag (done\nat btrfs_destroy_ordered_extents()), and then after that if we enter\nbtrfs_split_ordered_extent() and the ordered extent has bytes left\n(meaning we have a bio that doesn\u0027t cover the whole ordered extent, see\ndetails at btrfs_extract_ordered_extent()), we will fail on the following\nassertion at btrfs_split_ordered_extent():\n\n   ASSERT(!(flags \u0026 ~BTRFS_ORDERED_TYPE_FLAGS));\n\nbecause the BTRFS_ORDERED_IOERR flag is set and the definition of\nBTRFS_ORDERED_TYPE_FLAGS is just the union of all flags that identify the\ntype of write (regular, nocow, prealloc, compressed, direct IO, encoded).\n\nFix this by returning an error from btrfs_extract_ordered_extent() if we\nfind the BTRFS_ORDERED_IOERR flag in the ordered extent. The error will\nbe the error that resulted in the transaction abort or -EIO if no\ntransaction abort happened.\n\nThis was recently reported by syzbot with the following trace:\n\n   FAULT_INJECTION: forcing a failure.\n   name failslab, interval 1, probability 0, space 0, times 1\n   CPU: 0 UID: 0 PID: 5321 Comm: syz.0.0 Not tainted 6.13.0-rc5-syzkaller #0\n   Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014\n   Call Trace:\n    \u003cTASK\u003e\n    __dump_stack lib/dump_stack.c:94 [inline]\n    dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120\n    fail_dump lib/fault-inject.c:53 [inline]\n    should_fail_ex+0x3b0/0x4e0 lib/fault-inject.c:154\n    should_failslab+0xac/0x100 mm/failslab.c:46\n    slab_pre_alloc_hook mm/slub.c:4072 [inline]\n    slab_alloc_node mm/slub.c:4148 [inline]\n    __do_kmalloc_node mm/slub.c:4297 [inline]\n    __kmalloc_noprof+0xdd/0x4c0 mm/slub.c:4310\n    kmalloc_noprof include/linux/slab.h:905 [inline]\n    kzalloc_noprof include/linux/slab.h:1037 [inline]\n    btrfs_chunk_alloc_add_chunk_item+0x244/0x1100 fs/btrfs/volumes.c:5742\n    reserve_chunk_space+0x1ca/0x2c0 fs/btrfs/block-group.c:4292\n    check_system_chunk fs/btrfs/block-group.c:4319 [inline]\n    do_chunk_alloc fs/btrfs/block-group.c:3891 [inline]\n    btrfs_chunk_alloc+0x77b/0xf80 fs/btrfs/block-group.c:4187\n    find_free_extent_update_loop fs/btrfs/extent-tree.c:4166 [inline]\n    find_free_extent+0x42d1/0x5810 fs/btrfs/extent-tree.c:4579\n    btrfs_reserve_extent+0x422/0x810 fs/btrfs/extent-tree.c:4672\n    btrfs_new_extent_direct fs/btrfs/direct-io.c:186 [inline]\n    btrfs_get_blocks_direct_write+0x706/0xfa0 fs/btrfs/direct-io.c:321\n    btrfs_dio_iomap_begin+0xbb7/0x1180 fs/btrfs/direct-io.c:525\n    iomap_iter+0x697/0xf60 fs/iomap/iter.c:90\n    __iomap_dio_rw+0xeb9/0x25b0 fs/iomap/direct-io.c:702\n    btrfs_dio_write fs/btrfs/direct-io.c:775 [inline]\n    btrfs_direct_write+0x610/0xa30 fs/btrfs/direct-io.c:880\n    btrfs_do_write_iter+0x2a0/0x760 fs/btrfs/file.c:1397\n    do_iter_readv_writev+0x600/0x880\n    vfs_writev+0x376/0xba0 fs/read_write.c:1050\n    do_pwritev fs/read_write.c:1146 [inline]\n    __do_sys_pwritev2 fs/read_write.c:1204 [inline]\n    __se_sys_pwritev2+0x196/0x2b0 fs/read_write.c:1195\n    do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n    do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n    entry_SYSCALL_64_after_hwframe+0x77/0x7f\n   RIP: 0033:0x7f1281f85d29\n   RSP: 002b:00007f12819fe038 EFLAGS: 00000246 ORIG_RAX: 0000000000000148\n   RAX: ffffffffffffffda RBX: 00007f1282176080 RCX: 00007f1281f85d29\n   RDX: 0000000000000001 RSI: 0000000020000240 RDI: 0000000000000005\n   RBP: 00007f12819fe090 R08: 0000000000000000 R09: 0000000000000003\n   R10: 0000000000007000 R11: 0000000000000246 R12: 0000000000000002\n   R13: 0000000000000000 R14: 00007f1282176080 R15: 00007ffcb9e23328\n    \u003c/TASK\u003e\n   BTRFS error (device loop0 state A): Transaction aborted (error -12)\n   BTRFS: error (device loop0 state A\n---truncated---"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-04T07:20:27.815Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/927b930f117bbae730a853c1dc43da8afe8380fa"
        },
        {
          "url": "https://git.kernel.org/stable/c/0ff88c2a742a7cbaa4d08507d864737d099b435a"
        },
        {
          "url": "https://git.kernel.org/stable/c/8ea8db4216d1029527ab4666f730650419451e32"
        },
        {
          "url": "https://git.kernel.org/stable/c/0d85f5c2dd91df6b5da454406756f463ba923b69"
        }
      ],
      "title": "btrfs: fix assertion failure when splitting ordered extent after transaction abort",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2025-21754",
    "datePublished": "2025-02-27T02:12:23.738Z",
    "dateReserved": "2024-12-29T08:45:45.760Z",
    "dateUpdated": "2025-05-04T07:20:27.815Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-21754\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-02-27T03:15:16.050\",\"lastModified\":\"2025-02-27T03:15:16.050\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nbtrfs: fix assertion failure when splitting ordered extent after transaction abort\\n\\nIf while we are doing a direct IO write a transaction abort happens, we\\nmark all existing ordered extents with the BTRFS_ORDERED_IOERR flag (done\\nat btrfs_destroy_ordered_extents()), and then after that if we enter\\nbtrfs_split_ordered_extent() and the ordered extent has bytes left\\n(meaning we have a bio that doesn\u0027t cover the whole ordered extent, see\\ndetails at btrfs_extract_ordered_extent()), we will fail on the following\\nassertion at btrfs_split_ordered_extent():\\n\\n   ASSERT(!(flags \u0026 ~BTRFS_ORDERED_TYPE_FLAGS));\\n\\nbecause the BTRFS_ORDERED_IOERR flag is set and the definition of\\nBTRFS_ORDERED_TYPE_FLAGS is just the union of all flags that identify the\\ntype of write (regular, nocow, prealloc, compressed, direct IO, encoded).\\n\\nFix this by returning an error from btrfs_extract_ordered_extent() if we\\nfind the BTRFS_ORDERED_IOERR flag in the ordered extent. The error will\\nbe the error that resulted in the transaction abort or -EIO if no\\ntransaction abort happened.\\n\\nThis was recently reported by syzbot with the following trace:\\n\\n   FAULT_INJECTION: forcing a failure.\\n   name failslab, interval 1, probability 0, space 0, times 1\\n   CPU: 0 UID: 0 PID: 5321 Comm: syz.0.0 Not tainted 6.13.0-rc5-syzkaller #0\\n   Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014\\n   Call Trace:\\n    \u003cTASK\u003e\\n    __dump_stack lib/dump_stack.c:94 [inline]\\n    dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120\\n    fail_dump lib/fault-inject.c:53 [inline]\\n    should_fail_ex+0x3b0/0x4e0 lib/fault-inject.c:154\\n    should_failslab+0xac/0x100 mm/failslab.c:46\\n    slab_pre_alloc_hook mm/slub.c:4072 [inline]\\n    slab_alloc_node mm/slub.c:4148 [inline]\\n    __do_kmalloc_node mm/slub.c:4297 [inline]\\n    __kmalloc_noprof+0xdd/0x4c0 mm/slub.c:4310\\n    kmalloc_noprof include/linux/slab.h:905 [inline]\\n    kzalloc_noprof include/linux/slab.h:1037 [inline]\\n    btrfs_chunk_alloc_add_chunk_item+0x244/0x1100 fs/btrfs/volumes.c:5742\\n    reserve_chunk_space+0x1ca/0x2c0 fs/btrfs/block-group.c:4292\\n    check_system_chunk fs/btrfs/block-group.c:4319 [inline]\\n    do_chunk_alloc fs/btrfs/block-group.c:3891 [inline]\\n    btrfs_chunk_alloc+0x77b/0xf80 fs/btrfs/block-group.c:4187\\n    find_free_extent_update_loop fs/btrfs/extent-tree.c:4166 [inline]\\n    find_free_extent+0x42d1/0x5810 fs/btrfs/extent-tree.c:4579\\n    btrfs_reserve_extent+0x422/0x810 fs/btrfs/extent-tree.c:4672\\n    btrfs_new_extent_direct fs/btrfs/direct-io.c:186 [inline]\\n    btrfs_get_blocks_direct_write+0x706/0xfa0 fs/btrfs/direct-io.c:321\\n    btrfs_dio_iomap_begin+0xbb7/0x1180 fs/btrfs/direct-io.c:525\\n    iomap_iter+0x697/0xf60 fs/iomap/iter.c:90\\n    __iomap_dio_rw+0xeb9/0x25b0 fs/iomap/direct-io.c:702\\n    btrfs_dio_write fs/btrfs/direct-io.c:775 [inline]\\n    btrfs_direct_write+0x610/0xa30 fs/btrfs/direct-io.c:880\\n    btrfs_do_write_iter+0x2a0/0x760 fs/btrfs/file.c:1397\\n    do_iter_readv_writev+0x600/0x880\\n    vfs_writev+0x376/0xba0 fs/read_write.c:1050\\n    do_pwritev fs/read_write.c:1146 [inline]\\n    __do_sys_pwritev2 fs/read_write.c:1204 [inline]\\n    __se_sys_pwritev2+0x196/0x2b0 fs/read_write.c:1195\\n    do_syscall_x64 arch/x86/entry/common.c:52 [inline]\\n    do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\\n    entry_SYSCALL_64_after_hwframe+0x77/0x7f\\n   RIP: 0033:0x7f1281f85d29\\n   RSP: 002b:00007f12819fe038 EFLAGS: 00000246 ORIG_RAX: 0000000000000148\\n   RAX: ffffffffffffffda RBX: 00007f1282176080 RCX: 00007f1281f85d29\\n   RDX: 0000000000000001 RSI: 0000000020000240 RDI: 0000000000000005\\n   RBP: 00007f12819fe090 R08: 0000000000000000 R09: 0000000000000003\\n   R10: 0000000000007000 R11: 0000000000000246 R12: 0000000000000002\\n   R13: 0000000000000000 R14: 00007f1282176080 R15: 00007ffcb9e23328\\n    \u003c/TASK\u003e\\n   BTRFS error (device loop0 state A): Transaction aborted (error -12)\\n   BTRFS: error (device loop0 state A\\n---truncated---\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: corrige el error de aserci\u00f3n al dividir la extensi\u00f3n ordenada despu\u00e9s de la interrupci\u00f3n de la transacci\u00f3n Si mientras estamos realizando una escritura de E/S directa ocurre una interrupci\u00f3n de la transacci\u00f3n, marcamos todas las extensiones ordenadas existentes con el indicador BTRFS_ORDERED_IOERR (hecho en btrfs_destroy_ordered_extents()), y luego de eso si ingresamos btrfs_split_ordered_extent() y la extensi\u00f3n ordenada tiene bytes restantes (lo que significa que tenemos una biograf\u00eda que no cubre toda la extensi\u00f3n ordenada, vea los detalles en btrfs_extract_ordered_extent()), fallaremos en la siguiente aserci\u00f3n en btrfs_split_ordered_extent(): ASSERT(!(flags \u0026amp; ~BTRFS_ORDERED_TYPE_FLAGS)); porque el indicador BTRFS_ORDERED_IOERR est\u00e1 configurado y la definici\u00f3n de BTRFS_ORDERED_TYPE_FLAGS es solo la uni\u00f3n de todos los indicadores que identifican el tipo de escritura (regular, nocow, prealloc, comprimido, E/S directa, codificado). Solucione esto devolviendo un error de btrfs_extract_ordered_extent() si encontramos el indicador BTRFS_ORDERED_IOERR en la extensi\u00f3n ordenada. El error ser\u00e1 el error que result\u00f3 en la interrupci\u00f3n de la transacci\u00f3n o -EIO si no ocurri\u00f3 ninguna interrupci\u00f3n de la transacci\u00f3n. Esto fue informado recientemente por syzbot con el siguiente seguimiento: FAULT_INJECTION: forzando una falla. nombre failslab, intervalo 1, probabilidad 0, espacio 0, multiplicado por 1 CPU: 0 UID: 0 PID: 5321 Comm: syz.0.0 No contaminado 6.13.0-rc5-syzkaller #0 Nombre del hardware: PC est\u00e1ndar QEMU (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 01/04/2014 Seguimiento de llamadas:  __dump_stack lib/dump_stack.c:94 [en l\u00ednea] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 fail_dump lib/fault-inject.c:53 [en l\u00ednea] should_fail_ex+0x3b0/0x4e0 lib/fault-inject.c:154 should_failslab+0xac/0x100 mm/failslab.c:46 slab_pre_alloc_hook mm/slub.c:4072 [en l\u00ednea] slab_alloc_node mm/slub.c:4148 [en l\u00ednea] __do_kmalloc_node mm/slub.c:4297 [en l\u00ednea] __kmalloc_noprof+0xdd/0x4c0 mm/slub.c:4310 kmalloc_noprof include/linux/slab.h:905 [en l\u00ednea] kzalloc_noprof include/linux/slab.h:1037 [en l\u00ednea] btrfs_chunk_alloc_add_chunk_item+0x244/0x1100 fs/btrfs/volumes.c:5742 reserve_chunk_space+0x1ca/0x2c0 fs/btrfs/block-group.c:4292 check_system_chunk fs/btrfs/block-group.c:4319 [en l\u00ednea] do_chunk_alloc fs/btrfs/block-group.c:3891 [en l\u00ednea] btrfs_chunk_alloc+0x77b/0xf80 fs/btrfs/block-group.c:4187 find_free_extent_update_loop fs/btrfs/extent-tree.c:4166 [en l\u00ednea] find_free_extent+0x42d1/0x5810 fs/btrfs/extent-tree.c:4579 btrfs_reserve_extent+0x422/0x810 fs/btrfs/extent-tree.c:4672 btrfs_new_extent_direct fs/btrfs/direct-io.c:186 [en l\u00ednea] btrfs_get_blocks_direct_write+0x706/0xfa0 fs/btrfs/direct-io.c:321 btrfs_dio_iomap_begin+0xbb7/0x1180 fs/btrfs/direct-io.c:525 iomap_iter+0x697/0xf60 fs/iomap/iter.c:90 __iomap_dio_rw+0xeb9/0x25b0 fs/iomap/direct-io.c:702 btrfs_dio_write fs/btrfs/direct-io.c:775 [en l\u00ednea] btrfs_direct_write+0x610/0xa30 fs/btrfs/direct-io.c:880 btrfs_do_write_iter+0x2a0/0x760 fs/btrfs/file.c:1397 do_iter_readv_writev+0x600/0x880 vfs_writev+0x376/0xba0 fs/read_write.c:1050 do_pwritev fs/read_write.c:1146 [en l\u00ednea] __do_sys_pwritev2 fs/read_write.c:1204 [en l\u00ednea] __se_sys_pwritev2+0x196/0x2b0 fs/read_write.c:1195 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f1281f85d29 RSP: 002b:00007f12819fe038 EFLAGS: 00000246 ORIG_RAX: 0000000000000148 RAX: ffffffffffffffda RBX: 00007f1282176080 RCX: 00007f1281f85d29 RDX: 0000000000000001 RSI: 0000000020000240 RDI: 00000000000000005 RBP: 00007f12819fe090 R08: 0000000000000000 R09: 0000000000000003 R10: 0000000000007000 R11: 0000000000000246 R12: 0000000000000002 R13: 0000000000000000 R14: 00007f1282176080 R15: 00007ffcb9e23328  Error BTRFS (estado A del bucle 0 del dispositivo): transacci\u00f3n abortada (error -12) BTRFS: ---truncado---\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/0d85f5c2dd91df6b5da454406756f463ba923b69\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/0ff88c2a742a7cbaa4d08507d864737d099b435a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/8ea8db4216d1029527ab4666f730650419451e32\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/927b930f117bbae730a853c1dc43da8afe8380fa\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…