CVE-2022-48920
22.08.2024, 02:15
In the Linux kernel, the following vulnerability has been resolved: btrfs: get rid of warning on transaction commit when using flushoncommit When using the flushoncommit mount option, during almost every transaction commit we trigger a warning from __writeback_inodes_sb_nr(): $ cat fs/fs-writeback.c: (...) static void __writeback_inodes_sb_nr(struct super_block *sb, ... { (...) WARN_ON(!rwsem_is_locked(&sb->s_umount)); (...) } (...) The trace produced in dmesg looks like the following: [947.473890] WARNING: CPU: 5 PID: 930 at fs/fs-writeback.c:2610 __writeback_inodes_sb_nr+0x7e/0xb3 [947.481623] Modules linked in: nfsd nls_cp437 cifs asn1_decoder cifs_arc4 fscache cifs_md4 ipmi_ssif [947.489571] CPU: 5 PID: 930 Comm: btrfs-transacti Not tainted 95.16.3-srb-asrock-00001-g36437ad63879 #186 [947.497969] RIP: 0010:__writeback_inodes_sb_nr+0x7e/0xb3 [947.502097] Code: 24 10 4c 89 44 24 18 c6 (...) [947.519760] RSP: 0018:ffffc90000777e10 EFLAGS: 00010246 [947.523818] RAX: 0000000000000000 RBX: 0000000000963300 RCX: 0000000000000000 [947.529765] RDX: 0000000000000000 RSI: 000000000000fa51 RDI: ffffc90000777e50 [947.535740] RBP: ffff888101628a90 R08: ffff888100955800 R09: ffff888100956000 [947.541701] R10: 0000000000000002 R11: 0000000000000001 R12: ffff888100963488 [947.547645] R13: ffff888100963000 R14: ffff888112fb7200 R15: ffff888100963460 [947.553621] FS: 0000000000000000(0000) GS:ffff88841fd40000(0000) knlGS:0000000000000000 [947.560537] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [947.565122] CR2: 0000000008be50c4 CR3: 000000000220c000 CR4: 00000000001006e0 [947.571072] Call Trace: [947.572354] <TASK> [947.573266] btrfs_commit_transaction+0x1f1/0x998 [947.576785] ? start_transaction+0x3ab/0x44e [947.579867] ? schedule_timeout+0x8a/0xdd [947.582716] transaction_kthread+0xe9/0x156 [947.585721] ? btrfs_cleanup_transaction.isra.0+0x407/0x407 [947.590104] kthread+0x131/0x139 [947.592168] ? set_kthread_struct+0x32/0x32 [947.595174] ret_from_fork+0x22/0x30 [947.597561] </TASK> [947.598553] ---[ end trace 644721052755541c ]--- This is because we started using writeback_inodes_sb() to flush delalloc when committing a transaction (when using -o flushoncommit), in order to avoid deadlocks with filesystem freeze operations. This change was made by commit ce8ea7cc6eb313 ("btrfs: don't call btrfs_start_delalloc_roots in flushoncommit"). After that change we started producing that warning, and every now and then a user reports this since the warning happens too often, it spams dmesg/syslog, and a user is unsure if this reflects any problem that might compromise the filesystem's reliability. We can not just lock the sb->s_umount semaphore before calling writeback_inodes_sb(), because that would at least deadlock with filesystem freezing, since at fs/super.c:freeze_super() sync_filesystem() is called while we are holding that semaphore in write mode, and that can trigger a transaction commit, resulting in a deadlock. It would also trigger the same type of deadlock in the unmount path. Possibly, it could also introduce some other locking dependencies that lockdep would report. To fix this call try_to_writeback_inodes_sb() instead of writeback_inodes_sb(), because that will try to read lock sb->s_umount and then will only call writeback_inodes_sb() if it was able to lock it. This is fine because the cases where it can't read lock sb->s_umount are during a filesystem unmount or during a filesystem freeze - in those cases sb->s_umount is write locked and sync_filesystem() is called, which calls writeback_inodes_sb(). In other words, in all cases where we can't take a read lock on sb->s_umount, writeback is already being triggered elsewhere. An alternative would be to call btrfs_start_delalloc_roots() with a number of pages different from LONG_MAX, for example matching the number of delalloc bytes we currently have, in ---truncated---Enginsight
Vendor | Product | Version |
---|---|---|
linux | linux_kernel | 𝑥 < 5.15.27 |
linux | linux_kernel | 5.16 ≤ 𝑥 < 5.16.13 |
linux | linux_kernel | 5.17:rc1 |
linux | linux_kernel | 5.17:rc2 |
linux | linux_kernel | 5.17:rc3 |
linux | linux_kernel | 5.17:rc4 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
linux |
| ||||||||||||
linux-allwinner-5.19 |
| ||||||||||||
linux-aws |
| ||||||||||||
linux-aws-5.0 |
| ||||||||||||
linux-aws-5.11 |
| ||||||||||||
linux-aws-5.13 |
| ||||||||||||
linux-aws-5.15 |
| ||||||||||||
linux-aws-5.19 |
| ||||||||||||
linux-aws-5.3 |
| ||||||||||||
linux-aws-5.4 |
| ||||||||||||
linux-aws-5.8 |
| ||||||||||||
linux-aws-6.2 |
| ||||||||||||
linux-aws-6.5 |
| ||||||||||||
linux-aws-fips |
| ||||||||||||
linux-aws-hwe |
| ||||||||||||
linux-azure |
| ||||||||||||
linux-azure-4.15 |
| ||||||||||||
linux-azure-5.11 |
| ||||||||||||
linux-azure-5.13 |
| ||||||||||||
linux-azure-5.15 |
| ||||||||||||
linux-azure-5.19 |
| ||||||||||||
linux-azure-5.3 |
| ||||||||||||
linux-azure-5.4 |
| ||||||||||||
linux-azure-5.8 |
| ||||||||||||
linux-azure-6.2 |
| ||||||||||||
linux-azure-6.5 |
| ||||||||||||
linux-azure-edge |
| ||||||||||||
linux-azure-fde |
| ||||||||||||
linux-azure-fde-5.15 |
| ||||||||||||
linux-azure-fde-5.19 |
| ||||||||||||
linux-azure-fde-6.2 |
| ||||||||||||
linux-azure-fips |
| ||||||||||||
linux-bluefield |
| ||||||||||||
linux-fips |
| ||||||||||||
linux-gcp |
| ||||||||||||
linux-gcp-4.15 |
| ||||||||||||
linux-gcp-5.11 |
| ||||||||||||
linux-gcp-5.13 |
| ||||||||||||
linux-gcp-5.15 |
| ||||||||||||
linux-gcp-5.19 |
| ||||||||||||
linux-gcp-5.3 |
| ||||||||||||
linux-gcp-5.4 |
| ||||||||||||
linux-gcp-5.8 |
| ||||||||||||
linux-gcp-6.2 |
| ||||||||||||
linux-gcp-6.5 |
| ||||||||||||
linux-gcp-fips |
| ||||||||||||
linux-gke |
| ||||||||||||
linux-gke-4.15 |
| ||||||||||||
linux-gke-5.15 |
| ||||||||||||
linux-gke-5.4 |
| ||||||||||||
linux-gkeop |
| ||||||||||||
linux-gkeop-5.15 |
| ||||||||||||
linux-gkeop-5.4 |
| ||||||||||||
linux-hwe |
| ||||||||||||
linux-hwe-5.11 |
| ||||||||||||
linux-hwe-5.13 |
| ||||||||||||
linux-hwe-5.15 |
| ||||||||||||
linux-hwe-5.19 |
| ||||||||||||
linux-hwe-5.4 |
| ||||||||||||
linux-hwe-5.8 |
| ||||||||||||
linux-hwe-6.2 |
| ||||||||||||
linux-hwe-6.5 |
| ||||||||||||
linux-hwe-6.8 |
| ||||||||||||
linux-hwe-edge |
| ||||||||||||
linux-ibm |
| ||||||||||||
linux-ibm-5.15 |
| ||||||||||||
linux-ibm-5.4 |
| ||||||||||||
linux-intel |
| ||||||||||||
linux-intel-5.13 |
| ||||||||||||
linux-intel-iot-realtime |
| ||||||||||||
linux-intel-iotg |
| ||||||||||||
linux-intel-iotg-5.15 |
| ||||||||||||
linux-iot |
| ||||||||||||
linux-kvm |
| ||||||||||||
linux-lowlatency |
| ||||||||||||
linux-lowlatency-hwe-5.15 |
| ||||||||||||
linux-lowlatency-hwe-5.19 |
| ||||||||||||
linux-lowlatency-hwe-6.2 |
| ||||||||||||
linux-lowlatency-hwe-6.5 |
| ||||||||||||
linux-lowlatency-hwe-6.8 |
| ||||||||||||
linux-lts-xenial |
| ||||||||||||
linux-nvidia |
| ||||||||||||
linux-nvidia-6.2 |
| ||||||||||||
linux-nvidia-6.5 |
| ||||||||||||
linux-nvidia-6.8 |
| ||||||||||||
linux-nvidia-lowlatency |
| ||||||||||||
linux-oem |
| ||||||||||||
linux-oem-5.10 |
| ||||||||||||
linux-oem-5.13 |
| ||||||||||||
linux-oem-5.14 |
| ||||||||||||
linux-oem-5.17 |
| ||||||||||||
linux-oem-5.6 |
| ||||||||||||
linux-oem-6.0 |
| ||||||||||||
linux-oem-6.1 |
| ||||||||||||
linux-oem-6.5 |
| ||||||||||||
linux-oem-6.8 |
| ||||||||||||
linux-oracle |
| ||||||||||||
linux-oracle-5.0 |
| ||||||||||||
linux-oracle-5.11 |
| ||||||||||||
linux-oracle-5.13 |
| ||||||||||||
linux-oracle-5.15 |
| ||||||||||||
linux-oracle-5.3 |
| ||||||||||||
linux-oracle-5.4 |
| ||||||||||||
linux-oracle-5.8 |
| ||||||||||||
linux-oracle-6.5 |
| ||||||||||||
linux-raspi |
| ||||||||||||
linux-raspi-5.4 |
| ||||||||||||
linux-raspi-realtime |
| ||||||||||||
linux-raspi2 |
| ||||||||||||
linux-realtime |
| ||||||||||||
linux-riscv |
| ||||||||||||
linux-riscv-5.11 |
| ||||||||||||
linux-riscv-5.15 |
| ||||||||||||
linux-riscv-5.19 |
| ||||||||||||
linux-riscv-5.8 |
| ||||||||||||
linux-riscv-6.5 |
| ||||||||||||
linux-riscv-6.8 |
| ||||||||||||
linux-starfive-5.19 |
| ||||||||||||
linux-starfive-6.2 |
| ||||||||||||
linux-starfive-6.5 |
| ||||||||||||
linux-xilinx-zynqmp |
|
Common Weakness Enumeration