CVE-2021-47510

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
24/05/2024
Last modified:
29/09/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> btrfs: fix re-dirty process of tree-log nodes<br /> <br /> There is a report of a transaction abort of -EAGAIN with the following<br /> script.<br /> <br /> #!/bin/sh<br /> <br /> for d in sda sdb; do<br /> mkfs.btrfs -d single -m single -f /dev/\${d}<br /> done<br /> <br /> mount /dev/sda /mnt/test<br /> mount /dev/sdb /mnt/scratch<br /> <br /> for dir in test scratch; do<br /> echo 3 &gt;/proc/sys/vm/drop_caches<br /> fio --directory=/mnt/\${dir} --name=fio.\${dir} --rw=read --size=50G --bs=64m \<br /> --numjobs=$(nproc) --time_based --ramp_time=5 --runtime=480 \<br /> --group_reporting |&amp; tee /dev/shm/fio.\${dir}<br /> echo 3 &gt;/proc/sys/vm/drop_caches<br /> done<br /> <br /> for d in sda sdb; do<br /> umount /dev/\${d}<br /> done<br /> <br /> The stack trace is shown in below.<br /> <br /> [3310.967991] BTRFS: error (device sda) in btrfs_commit_transaction:2341: errno=-11 unknown (Error while writing out transaction)<br /> [3310.968060] BTRFS info (device sda): forced readonly<br /> [3310.968064] BTRFS warning (device sda): Skipping commit of aborted transaction.<br /> [3310.968065] ------------[ cut here ]------------<br /> [3310.968066] BTRFS: Transaction aborted (error -11)<br /> [3310.968074] WARNING: CPU: 14 PID: 1684 at fs/btrfs/transaction.c:1946 btrfs_commit_transaction.cold+0x209/0x2c8<br /> [3310.968131] CPU: 14 PID: 1684 Comm: fio Not tainted 5.14.10-300.fc35.x86_64 #1<br /> [3310.968135] Hardware name: DIAWAY Tartu/Tartu, BIOS V2.01.B10 04/08/2021<br /> [3310.968137] RIP: 0010:btrfs_commit_transaction.cold+0x209/0x2c8<br /> [3310.968144] RSP: 0018:ffffb284ce393e10 EFLAGS: 00010282<br /> [3310.968147] RAX: 0000000000000026 RBX: ffff973f147b0f60 RCX: 0000000000000027<br /> [3310.968149] RDX: ffff974ecf098a08 RSI: 0000000000000001 RDI: ffff974ecf098a00<br /> [3310.968150] RBP: ffff973f147b0f08 R08: 0000000000000000 R09: ffffb284ce393c48<br /> [3310.968151] R10: ffffb284ce393c40 R11: ffffffff84f47468 R12: ffff973f101bfc00<br /> [3310.968153] R13: ffff971f20cf2000 R14: 00000000fffffff5 R15: ffff973f147b0e58<br /> [3310.968154] FS: 00007efe65468740(0000) GS:ffff974ecf080000(0000) knlGS:0000000000000000<br /> [3310.968157] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> [3310.968158] CR2: 000055691bcbe260 CR3: 000000105cfa4001 CR4: 0000000000770ee0<br /> [3310.968160] PKRU: 55555554<br /> [3310.968161] Call Trace:<br /> [3310.968167] ? dput+0xd4/0x300<br /> [3310.968174] btrfs_sync_file+0x3f1/0x490<br /> [3310.968180] __x64_sys_fsync+0x33/0x60<br /> [3310.968185] do_syscall_64+0x3b/0x90<br /> [3310.968190] entry_SYSCALL_64_after_hwframe+0x44/0xae<br /> [3310.968194] RIP: 0033:0x7efe6557329b<br /> [3310.968200] RSP: 002b:00007ffe0236ebc0 EFLAGS: 00000293 ORIG_RAX: 000000000000004a<br /> [3310.968203] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007efe6557329b<br /> [3310.968204] RDX: 0000000000000000 RSI: 00007efe58d77010 RDI: 0000000000000006<br /> [3310.968205] RBP: 0000000004000000 R08: 0000000000000000 R09: 00007efe58d77010<br /> [3310.968207] R10: 0000000016cacc0c R11: 0000000000000293 R12: 00007efe5ce95980<br /> [3310.968208] R13: 0000000000000000 R14: 00007efe6447c790 R15: 0000000c80000000<br /> [3310.968212] ---[ end trace 1a346f4d3c0d96ba ]---<br /> [3310.968214] BTRFS: error (device sda) in cleanup_transaction:1946: errno=-11 unknown<br /> <br /> The abort occurs because of a write hole while writing out freeing tree<br /> nodes of a tree-log tree. For zoned btrfs, we re-dirty a freed tree<br /> node to ensure btrfs can write the region and does not leave a hole on<br /> write on a zoned device. The current code fails to re-dirty a node<br /> when the tree-log tree&amp;#39;s depth is greater or equal to 2. That leads to<br /> a transaction abort with -EAGAIN.<br /> <br /> Fix the issue by properly re-dirtying a node on walking up the tree.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.12 (including) 5.15.8 (excluding)
cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*