Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-48745

Publication date:
20/06/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net/mlx5: Use del_timer_sync in fw reset flow of halting poll<br /> <br /> Substitute del_timer() with del_timer_sync() in fw reset polling<br /> deactivation flow, in order to prevent a race condition which occurs<br /> when del_timer() is called and timer is deactivated while another<br /> process is handling the timer interrupt. A situation that led to<br /> the following call trace:<br /> RIP: 0010:run_timer_softirq+0x137/0x420<br /> <br /> recalibrate_cpu_khz+0x10/0x10<br /> ktime_get+0x3e/0xa0<br /> ? sched_clock_cpu+0xb/0xc0<br /> __do_softirq+0xf5/0x2ea<br /> irq_exit_rcu+0xc1/0xf0<br /> sysvec_apic_timer_interrupt+0x9e/0xc0<br /> asm_sysvec_apic_timer_interrupt+0x12/0x20<br />
Severity CVSS v4.0: Pending analysis
Last modification:
29/09/2025

CVE-2022-48746

Publication date:
20/06/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net/mlx5e: Fix handling of wrong devices during bond netevent<br /> <br /> Current implementation of bond netevent handler only check if<br /> the handled netdev is VF representor and it missing a check if<br /> the VF representor is on the same phys device of the bond handling<br /> the netevent.<br /> <br /> Fix by adding the missing check and optimizing the check if<br /> the netdev is VF representor so it will not access uninitialized<br /> private data and crashes.<br /> <br /> BUG: kernel NULL pointer dereference, address: 000000000000036c<br /> PGD 0 P4D 0<br /> Oops: 0000 [#1] SMP NOPTI<br /> Workqueue: eth3bond0 bond_mii_monitor [bonding]<br /> RIP: 0010:mlx5e_is_uplink_rep+0xc/0x50 [mlx5_core]<br /> RSP: 0018:ffff88812d69fd60 EFLAGS: 00010282<br /> RAX: 0000000000000000 RBX: ffff8881cf800000 RCX: 0000000000000000<br /> RDX: ffff88812d69fe10 RSI: 000000000000001b RDI: ffff8881cf800880<br /> RBP: ffff8881cf800000 R08: 00000445cabccf2b R09: 0000000000000008<br /> R10: 0000000000000004 R11: 0000000000000008 R12: ffff88812d69fe10<br /> R13: 00000000fffffffe R14: ffff88820c0f9000 R15: 0000000000000000<br /> FS: 0000000000000000(0000) GS:ffff88846fb00000(0000) knlGS:0000000000000000<br /> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> CR2: 000000000000036c CR3: 0000000103d80006 CR4: 0000000000370ea0<br /> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br /> DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400<br /> Call Trace:<br /> mlx5e_eswitch_uplink_rep+0x31/0x40 [mlx5_core]<br /> mlx5e_rep_is_lag_netdev+0x94/0xc0 [mlx5_core]<br /> mlx5e_rep_esw_bond_netevent+0xeb/0x3d0 [mlx5_core]<br /> raw_notifier_call_chain+0x41/0x60<br /> call_netdevice_notifiers_info+0x34/0x80<br /> netdev_lower_state_changed+0x4e/0xa0<br /> bond_mii_monitor+0x56b/0x640 [bonding]<br /> process_one_work+0x1b9/0x390<br /> worker_thread+0x4d/0x3d0<br /> ? rescuer_thread+0x350/0x350<br /> kthread+0x124/0x150<br /> ? set_kthread_struct+0x40/0x40<br /> ret_from_fork+0x1f/0x30
Severity CVSS v4.0: Pending analysis
Last modification:
06/01/2025

CVE-2022-48747

Publication date:
20/06/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> block: Fix wrong offset in bio_truncate()<br /> <br /> bio_truncate() clears the buffer outside of last block of bdev, however<br /> current bio_truncate() is using the wrong offset of page. So it can<br /> return the uninitialized data.<br /> <br /> This happened when both of truncated/corrupted FS and userspace (via<br /> bdev) are trying to read the last of bdev.
Severity CVSS v4.0: Pending analysis
Last modification:
24/03/2025

CVE-2022-48744

Publication date:
20/06/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net/mlx5e: Avoid field-overflowing memcpy()<br /> <br /> In preparation for FORTIFY_SOURCE performing compile-time and run-time<br /> field bounds checking for memcpy(), memmove(), and memset(), avoid<br /> intentionally writing across neighboring fields.<br /> <br /> Use flexible arrays instead of zero-element arrays (which look like they<br /> are always overflowing) and split the cross-field memcpy() into two halves<br /> that can be appropriately bounds-checked by the compiler.<br /> <br /> We were doing:<br /> <br /> #define ETH_HLEN 14<br /> #define VLAN_HLEN 4<br /> ...<br /> #define MLX5E_XDP_MIN_INLINE (ETH_HLEN + VLAN_HLEN)<br /> ...<br /> struct mlx5e_tx_wqe *wqe = mlx5_wq_cyc_get_wqe(wq, pi);<br /> ...<br /> struct mlx5_wqe_eth_seg *eseg = &amp;wqe-&gt;eth;<br /> struct mlx5_wqe_data_seg *dseg = wqe-&gt;data;<br /> ...<br /> memcpy(eseg-&gt;inline_hdr.start, xdptxd-&gt;data, MLX5E_XDP_MIN_INLINE);<br /> <br /> target is wqe-&gt;eth.inline_hdr.start (which the compiler sees as being<br /> 2 bytes in size), but copying 18, intending to write across start<br /> (really vlan_tci, 2 bytes). The remaining 16 bytes get written into<br /> wqe-&gt;data[0], covering byte_count (4 bytes), lkey (4 bytes), and addr<br /> (8 bytes).<br /> <br /> struct mlx5e_tx_wqe {<br /> struct mlx5_wqe_ctrl_seg ctrl; /* 0 16 */<br /> struct mlx5_wqe_eth_seg eth; /* 16 16 */<br /> struct mlx5_wqe_data_seg data[]; /* 32 0 */<br /> <br /> /* size: 32, cachelines: 1, members: 3 */<br /> /* last cacheline: 32 bytes */<br /> };<br /> <br /> struct mlx5_wqe_eth_seg {<br /> u8 swp_outer_l4_offset; /* 0 1 */<br /> u8 swp_outer_l3_offset; /* 1 1 */<br /> u8 swp_inner_l4_offset; /* 2 1 */<br /> u8 swp_inner_l3_offset; /* 3 1 */<br /> u8 cs_flags; /* 4 1 */<br /> u8 swp_flags; /* 5 1 */<br /> __be16 mss; /* 6 2 */<br /> __be32 flow_table_metadata; /* 8 4 */<br /> union {<br /> struct {<br /> __be16 sz; /* 12 2 */<br /> u8 start[2]; /* 14 2 */<br /> } inline_hdr; /* 12 4 */<br /> struct {<br /> __be16 type; /* 12 2 */<br /> __be16 vlan_tci; /* 14 2 */<br /> } insert; /* 12 4 */<br /> __be32 trailer; /* 12 4 */<br /> }; /* 12 4 */<br /> <br /> /* size: 16, cachelines: 1, members: 9 */<br /> /* last cacheline: 16 bytes */<br /> };<br /> <br /> struct mlx5_wqe_data_seg {<br /> __be32 byte_count; /* 0 4 */<br /> __be32 lkey; /* 4 4 */<br /> __be64 addr; /* 8 8 */<br /> <br /> /* size: 16, cachelines: 1, members: 3 */<br /> /* last cacheline: 16 bytes */<br /> };<br /> <br /> So, split the memcpy() so the compiler can reason about the buffer<br /> sizes.<br /> <br /> "pahole" shows no size nor member offset changes to struct mlx5e_tx_wqe<br /> nor struct mlx5e_umr_wqe. "objdump -d" shows no meaningful object<br /> code changes (i.e. only source line number induced differences and<br /> optimizations).
Severity CVSS v4.0: Pending analysis
Last modification:
21/01/2026

CVE-2022-48726

Publication date:
20/06/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> RDMA/ucma: Protect mc during concurrent multicast leaves<br /> <br /> Partially revert the commit mentioned in the Fixes line to make sure that<br /> allocation and erasing multicast struct are locked.<br /> <br /> BUG: KASAN: use-after-free in ucma_cleanup_multicast drivers/infiniband/core/ucma.c:491 [inline]<br /> BUG: KASAN: use-after-free in ucma_destroy_private_ctx+0x914/0xb70 drivers/infiniband/core/ucma.c:579<br /> Read of size 8 at addr ffff88801bb74b00 by task syz-executor.1/25529<br /> CPU: 0 PID: 25529 Comm: syz-executor.1 Not tainted 5.16.0-rc7-syzkaller #0<br /> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011<br /> Call Trace:<br /> __dump_stack lib/dump_stack.c:88 [inline]<br /> dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106<br /> print_address_description.constprop.0.cold+0x8d/0x320 mm/kasan/report.c:247<br /> __kasan_report mm/kasan/report.c:433 [inline]<br /> kasan_report.cold+0x83/0xdf mm/kasan/report.c:450<br /> ucma_cleanup_multicast drivers/infiniband/core/ucma.c:491 [inline]<br /> ucma_destroy_private_ctx+0x914/0xb70 drivers/infiniband/core/ucma.c:579<br /> ucma_destroy_id+0x1e6/0x280 drivers/infiniband/core/ucma.c:614<br /> ucma_write+0x25c/0x350 drivers/infiniband/core/ucma.c:1732<br /> vfs_write+0x28e/0xae0 fs/read_write.c:588<br /> ksys_write+0x1ee/0x250 fs/read_write.c:643<br /> do_syscall_x64 arch/x86/entry/common.c:50 [inline]<br /> do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80<br /> entry_SYSCALL_64_after_hwframe+0x44/0xae<br /> <br /> Currently the xarray search can touch a concurrently freeing mc as the<br /> xa_for_each() is not surrounded by any lock. Rather than hold the lock for<br /> a full scan hold it only for the effected items, which is usually an empty<br /> list.
Severity CVSS v4.0: Pending analysis
Last modification:
18/09/2024

CVE-2022-48727

Publication date:
20/06/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> KVM: arm64: Avoid consuming a stale esr value when SError occur<br /> <br /> When any exception other than an IRQ occurs, the CPU updates the ESR_EL2<br /> register with the exception syndrome. An SError may also become pending,<br /> and will be synchronised by KVM. KVM notes the exception type, and whether<br /> an SError was synchronised in exit_code.<br /> <br /> When an exception other than an IRQ occurs, fixup_guest_exit() updates<br /> vcpu-&gt;arch.fault.esr_el2 from the hardware register. When an SError was<br /> synchronised, the vcpu esr value is used to determine if the exception<br /> was due to an HVC. If so, ELR_EL2 is moved back one instruction. This<br /> is so that KVM can process the SError first, and re-execute the HVC if<br /> the guest survives the SError.<br /> <br /> But if an IRQ synchronises an SError, the vcpu&amp;#39;s esr value is stale.<br /> If the previous non-IRQ exception was an HVC, KVM will corrupt ELR_EL2,<br /> causing an unrelated guest instruction to be executed twice.<br /> <br /> Check ARM_EXCEPTION_CODE() before messing with ELR_EL2, IRQs don&amp;#39;t<br /> update this register so don&amp;#39;t need to check.
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2025

CVE-2022-48728

Publication date:
20/06/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> IB/hfi1: Fix AIP early init panic<br /> <br /> An early failure in hfi1_ipoib_setup_rn() can lead to the following panic:<br /> <br /> BUG: unable to handle kernel NULL pointer dereference at 00000000000001b0<br /> PGD 0 P4D 0<br /> Oops: 0002 [#1] SMP NOPTI<br /> Workqueue: events work_for_cpu_fn<br /> RIP: 0010:try_to_grab_pending+0x2b/0x140<br /> Code: 1f 44 00 00 41 55 41 54 55 48 89 d5 53 48 89 fb 9c 58 0f 1f 44 00 00 48 89 c2 fa 66 0f 1f 44 00 00 48 89 55 00 40 84 f6 75 77 48 0f ba 2b 00 72 09 31 c0 5b 5d 41 5c 41 5d c3 48 89 df e8 6c<br /> RSP: 0018:ffffb6b3cf7cfa48 EFLAGS: 00010046<br /> RAX: 0000000000000246 RBX: 00000000000001b0 RCX: 0000000000000000<br /> RDX: 0000000000000246 RSI: 0000000000000000 RDI: 00000000000001b0<br /> RBP: ffffb6b3cf7cfa70 R08: 0000000000000f09 R09: 0000000000000001<br /> R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000<br /> R13: ffffb6b3cf7cfa90 R14: ffffffff9b2fbfc0 R15: ffff8a4fdf244690<br /> FS: 0000000000000000(0000) GS:ffff8a527f400000(0000) knlGS:0000000000000000<br /> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> CR2: 00000000000001b0 CR3: 00000017e2410003 CR4: 00000000007706f0<br /> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br /> DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400<br /> PKRU: 55555554<br /> Call Trace:<br /> __cancel_work_timer+0x42/0x190<br /> ? dev_printk_emit+0x4e/0x70<br /> iowait_cancel_work+0x15/0x30 [hfi1]<br /> hfi1_ipoib_txreq_deinit+0x5a/0x220 [hfi1]<br /> ? dev_err+0x6c/0x90<br /> hfi1_ipoib_netdev_dtor+0x15/0x30 [hfi1]<br /> hfi1_ipoib_setup_rn+0x10e/0x150 [hfi1]<br /> rdma_init_netdev+0x5a/0x80 [ib_core]<br /> ? hfi1_ipoib_free_rdma_netdev+0x20/0x20 [hfi1]<br /> ipoib_intf_init+0x6c/0x350 [ib_ipoib]<br /> ipoib_intf_alloc+0x5c/0xc0 [ib_ipoib]<br /> ipoib_add_one+0xbe/0x300 [ib_ipoib]<br /> add_client_context+0x12c/0x1a0 [ib_core]<br /> enable_device_and_get+0xdc/0x1d0 [ib_core]<br /> ib_register_device+0x572/0x6b0 [ib_core]<br /> rvt_register_device+0x11b/0x220 [rdmavt]<br /> hfi1_register_ib_device+0x6b4/0x770 [hfi1]<br /> do_init_one.isra.20+0x3e3/0x680 [hfi1]<br /> local_pci_probe+0x41/0x90<br /> work_for_cpu_fn+0x16/0x20<br /> process_one_work+0x1a7/0x360<br /> ? create_worker+0x1a0/0x1a0<br /> worker_thread+0x1cf/0x390<br /> ? create_worker+0x1a0/0x1a0<br /> kthread+0x116/0x130<br /> ? kthread_flush_work_fn+0x10/0x10<br /> ret_from_fork+0x1f/0x40<br /> <br /> The panic happens in hfi1_ipoib_txreq_deinit() because there is a NULL<br /> deref when hfi1_ipoib_netdev_dtor() is called in this error case.<br /> <br /> hfi1_ipoib_txreq_init() and hfi1_ipoib_rxq_init() are self unwinding so<br /> fix by adjusting the error paths accordingly.<br /> <br /> Other changes:<br /> - hfi1_ipoib_free_rdma_netdev() is deleted including the free_netdev()<br /> since the netdev core code deletes calls free_netdev()<br /> - The switch to the accelerated entrances is moved to the success path.
Severity CVSS v4.0: Pending analysis
Last modification:
18/09/2024

CVE-2022-48729

Publication date:
20/06/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> IB/hfi1: Fix panic with larger ipoib send_queue_size<br /> <br /> When the ipoib send_queue_size is increased from the default the following<br /> panic happens:<br /> <br /> RIP: 0010:hfi1_ipoib_drain_tx_ring+0x45/0xf0 [hfi1]<br /> Code: 31 e4 eb 0f 8b 85 c8 02 00 00 41 83 c4 01 44 39 e0 76 60 8b 8d cc 02 00 00 44 89 e3 be 01 00 00 00 d3 e3 48 03 9d c0 02 00 00 83 18 01 00 00 00 00 00 00 48 8b bb 30 01 00 00 e8 25 af a7 e0<br /> RSP: 0018:ffffc9000798f4a0 EFLAGS: 00010286<br /> RAX: 0000000000008000 RBX: ffffc9000aa0f000 RCX: 000000000000000f<br /> RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000<br /> RBP: ffff88810ff08000 R08: ffff88889476d900 R09: 0000000000000101<br /> R10: 0000000000000000 R11: ffffc90006590ff8 R12: 0000000000000200<br /> R13: ffffc9000798fba8 R14: 0000000000000000 R15: 0000000000000001<br /> FS: 00007fd0f79cc3c0(0000) GS:ffff88885fb00000(0000) knlGS:0000000000000000<br /> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> CR2: ffffc9000aa0f118 CR3: 0000000889c84001 CR4: 00000000001706e0<br /> Call Trace:<br /> <br /> hfi1_ipoib_napi_tx_disable+0x45/0x60 [hfi1]<br /> hfi1_ipoib_dev_stop+0x18/0x80 [hfi1]<br /> ipoib_ib_dev_stop+0x1d/0x40 [ib_ipoib]<br /> ipoib_stop+0x48/0xc0 [ib_ipoib]<br /> __dev_close_many+0x9e/0x110<br /> __dev_change_flags+0xd9/0x210<br /> dev_change_flags+0x21/0x60<br /> do_setlink+0x31c/0x10f0<br /> ? __nla_validate_parse+0x12d/0x1a0<br /> ? __nla_parse+0x21/0x30<br /> ? inet6_validate_link_af+0x5e/0xf0<br /> ? cpumask_next+0x1f/0x20<br /> ? __snmp6_fill_stats64.isra.53+0xbb/0x140<br /> ? __nla_validate_parse+0x47/0x1a0<br /> __rtnl_newlink+0x530/0x910<br /> ? pskb_expand_head+0x73/0x300<br /> ? __kmalloc_node_track_caller+0x109/0x280<br /> ? __nla_put+0xc/0x20<br /> ? cpumask_next_and+0x20/0x30<br /> ? update_sd_lb_stats.constprop.144+0xd3/0x820<br /> ? _raw_spin_unlock_irqrestore+0x25/0x37<br /> ? __wake_up_common_lock+0x87/0xc0<br /> ? kmem_cache_alloc_trace+0x3d/0x3d0<br /> rtnl_newlink+0x43/0x60<br /> <br /> The issue happens when the shift that should have been a function of the<br /> txq item size mistakenly used the ring size.<br /> <br /> Fix by using the item size.
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2024

CVE-2022-48730

Publication date:
20/06/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> dma-buf: heaps: Fix potential spectre v1 gadget<br /> <br /> It appears like nr could be a Spectre v1 gadget as it&amp;#39;s supplied by a<br /> user and used as an array index. Prevent the contents<br /> of kernel memory from being leaked to userspace via speculative<br /> execution by using array_index_nospec.<br /> <br /> [sumits: added fixes and cc: stable tags]
Severity CVSS v4.0: Pending analysis
Last modification:
06/01/2025

CVE-2022-48731

Publication date:
20/06/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mm/kmemleak: avoid scanning potential huge holes<br /> <br /> When using devm_request_free_mem_region() and devm_memremap_pages() to<br /> add ZONE_DEVICE memory, if requested free mem region&amp;#39;s end pfn were<br /> huge(e.g., 0x400000000), the node_end_pfn() will be also huge (see<br /> move_pfn_range_to_zone()). Thus it creates a huge hole between<br /> node_start_pfn() and node_end_pfn().<br /> <br /> We found on some AMD APUs, amdkfd requested such a free mem region and<br /> created a huge hole. In such a case, following code snippet was just<br /> doing busy test_bit() looping on the huge hole.<br /> <br /> for (pfn = start_pfn; pfn
Severity CVSS v4.0: Pending analysis
Last modification:
01/04/2025

CVE-2022-48732

Publication date:
20/06/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/nouveau: fix off by one in BIOS boundary checking<br /> <br /> Bounds checking when parsing init scripts embedded in the BIOS reject<br /> access to the last byte. This causes driver initialization to fail on<br /> Apple eMac&amp;#39;s with GeForce 2 MX GPUs, leaving the system with no working<br /> console.<br /> <br /> This is probably only seen on OpenFirmware machines like PowerPC Macs<br /> because the BIOS image provided by OF is only the used parts of the ROM,<br /> not a power-of-two blocks read from PCI directly so PCs always have<br /> empty bytes at the end that are never accessed.
Severity CVSS v4.0: Pending analysis
Last modification:
19/08/2024

CVE-2022-48734

Publication date:
20/06/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> btrfs: fix deadlock between quota disable and qgroup rescan worker<br /> <br /> Quota disable ioctl starts a transaction before waiting for the qgroup<br /> rescan worker completes. However, this wait can be infinite and results<br /> in deadlock because of circular dependency among the quota disable<br /> ioctl, the qgroup rescan worker and the other task with transaction such<br /> as block group relocation task.<br /> <br /> The deadlock happens with the steps following:<br /> <br /> 1) Task A calls ioctl to disable quota. It starts a transaction and<br /> waits for qgroup rescan worker completes.<br /> 2) Task B such as block group relocation task starts a transaction and<br /> joins to the transaction that task A started. Then task B commits to<br /> the transaction. In this commit, task B waits for a commit by task A.<br /> 3) Task C as the qgroup rescan worker starts its job and starts a<br /> transaction. In this transaction start, task C waits for completion<br /> of the transaction that task A started and task B committed.<br /> <br /> This deadlock was found with fstests test case btrfs/115 and a zoned<br /> null_blk device. The test case enables and disables quota, and the<br /> block group reclaim was triggered during the quota disable by chance.<br /> The deadlock was also observed by running quota enable and disable in<br /> parallel with &amp;#39;btrfs balance&amp;#39; command on regular null_blk devices.<br /> <br /> An example report of the deadlock:<br /> <br /> [372.469894] INFO: task kworker/u16:6:103 blocked for more than 122 seconds.<br /> [372.479944] Not tainted 5.16.0-rc8 #7<br /> [372.485067] "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.<br /> [372.493898] task:kworker/u16:6 state:D stack: 0 pid: 103 ppid: 2 flags:0x00004000<br /> [372.503285] Workqueue: btrfs-qgroup-rescan btrfs_work_helper [btrfs]<br /> [372.510782] Call Trace:<br /> [372.514092] <br /> [372.521684] __schedule+0xb56/0x4850<br /> [372.530104] ? io_schedule_timeout+0x190/0x190<br /> [372.538842] ? lockdep_hardirqs_on+0x7e/0x100<br /> [372.547092] ? _raw_spin_unlock_irqrestore+0x3e/0x60<br /> [372.555591] schedule+0xe0/0x270<br /> [372.561894] btrfs_commit_transaction+0x18bb/0x2610 [btrfs]<br /> [372.570506] ? btrfs_apply_pending_changes+0x50/0x50 [btrfs]<br /> [372.578875] ? free_unref_page+0x3f2/0x650<br /> [372.585484] ? finish_wait+0x270/0x270<br /> [372.591594] ? release_extent_buffer+0x224/0x420 [btrfs]<br /> [372.599264] btrfs_qgroup_rescan_worker+0xc13/0x10c0 [btrfs]<br /> [372.607157] ? lock_release+0x3a9/0x6d0<br /> [372.613054] ? btrfs_qgroup_account_extent+0xda0/0xda0 [btrfs]<br /> [372.620960] ? do_raw_spin_lock+0x11e/0x250<br /> [372.627137] ? rwlock_bug.part.0+0x90/0x90<br /> [372.633215] ? lock_is_held_type+0xe4/0x140<br /> [372.639404] btrfs_work_helper+0x1ae/0xa90 [btrfs]<br /> [372.646268] process_one_work+0x7e9/0x1320<br /> [372.652321] ? lock_release+0x6d0/0x6d0<br /> [372.658081] ? pwq_dec_nr_in_flight+0x230/0x230<br /> [372.664513] ? rwlock_bug.part.0+0x90/0x90<br /> [372.670529] worker_thread+0x59e/0xf90<br /> [372.676172] ? process_one_work+0x1320/0x1320<br /> [372.682440] kthread+0x3b9/0x490<br /> [372.687550] ? _raw_spin_unlock_irq+0x24/0x50<br /> [372.693811] ? set_kthread_struct+0x100/0x100<br /> [372.700052] ret_from_fork+0x22/0x30<br /> [372.705517] <br /> [372.709747] INFO: task btrfs-transacti:2347 blocked for more than 123 seconds.<br /> [372.729827] Not tainted 5.16.0-rc8 #7<br /> [372.745907] "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.<br /> [372.767106] task:btrfs-transacti state:D stack: 0 pid: 2347 ppid: 2 flags:0x00004000<br /> [372.787776] Call Trace:<br /> [372.801652] <br /> [372.812961] __schedule+0xb56/0x4850<br /> [372.830011] ? io_schedule_timeout+0x190/0x190<br /> [372.852547] ? lockdep_hardirqs_on+0x7e/0x100<br /> [372.871761] ? _raw_spin_unlock_irqrestore+0x3e/0x60<br /> [372.886792] schedule+0xe0/0x270<br /> [372.901685] wait_current_trans+0x22c/0x310 [btrfs]<br /> [372.919743] ? btrfs_put_transaction+0x3d0/0x3d0 [btrfs]<br /> [372.938923] ? finish_wait+0x270/0x270<br /> [372.959085] ? join_transaction+0xc7<br /> ---truncated---
Severity CVSS v4.0: Pending analysis
Last modification:
19/08/2024