cve-2025-21754
Vulnerability from cvelistv5
Published
2025-02-27 02:12
Modified
2025-03-24 15:39
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix assertion failure when splitting ordered extent after transaction abort If while we are doing a direct IO write a transaction abort happens, we mark all existing ordered extents with the BTRFS_ORDERED_IOERR flag (done at btrfs_destroy_ordered_extents()), and then after that if we enter btrfs_split_ordered_extent() and the ordered extent has bytes left (meaning we have a bio that doesn't cover the whole ordered extent, see details at btrfs_extract_ordered_extent()), we will fail on the following assertion at btrfs_split_ordered_extent(): ASSERT(!(flags & ~BTRFS_ORDERED_TYPE_FLAGS)); because the BTRFS_ORDERED_IOERR flag is set and the definition of BTRFS_ORDERED_TYPE_FLAGS is just the union of all flags that identify the type of write (regular, nocow, prealloc, compressed, direct IO, encoded). Fix this by returning an error from btrfs_extract_ordered_extent() if we find the BTRFS_ORDERED_IOERR flag in the ordered extent. The error will be the error that resulted in the transaction abort or -EIO if no transaction abort happened. This was recently reported by syzbot with the following trace: FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 1 CPU: 0 UID: 0 PID: 5321 Comm: syz.0.0 Not tainted 6.13.0-rc5-syzkaller #0 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014 Call Trace: <TASK> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 fail_dump lib/fault-inject.c:53 [inline] should_fail_ex+0x3b0/0x4e0 lib/fault-inject.c:154 should_failslab+0xac/0x100 mm/failslab.c:46 slab_pre_alloc_hook mm/slub.c:4072 [inline] slab_alloc_node mm/slub.c:4148 [inline] __do_kmalloc_node mm/slub.c:4297 [inline] __kmalloc_noprof+0xdd/0x4c0 mm/slub.c:4310 kmalloc_noprof include/linux/slab.h:905 [inline] kzalloc_noprof include/linux/slab.h:1037 [inline] btrfs_chunk_alloc_add_chunk_item+0x244/0x1100 fs/btrfs/volumes.c:5742 reserve_chunk_space+0x1ca/0x2c0 fs/btrfs/block-group.c:4292 check_system_chunk fs/btrfs/block-group.c:4319 [inline] do_chunk_alloc fs/btrfs/block-group.c:3891 [inline] btrfs_chunk_alloc+0x77b/0xf80 fs/btrfs/block-group.c:4187 find_free_extent_update_loop fs/btrfs/extent-tree.c:4166 [inline] find_free_extent+0x42d1/0x5810 fs/btrfs/extent-tree.c:4579 btrfs_reserve_extent+0x422/0x810 fs/btrfs/extent-tree.c:4672 btrfs_new_extent_direct fs/btrfs/direct-io.c:186 [inline] btrfs_get_blocks_direct_write+0x706/0xfa0 fs/btrfs/direct-io.c:321 btrfs_dio_iomap_begin+0xbb7/0x1180 fs/btrfs/direct-io.c:525 iomap_iter+0x697/0xf60 fs/iomap/iter.c:90 __iomap_dio_rw+0xeb9/0x25b0 fs/iomap/direct-io.c:702 btrfs_dio_write fs/btrfs/direct-io.c:775 [inline] btrfs_direct_write+0x610/0xa30 fs/btrfs/direct-io.c:880 btrfs_do_write_iter+0x2a0/0x760 fs/btrfs/file.c:1397 do_iter_readv_writev+0x600/0x880 vfs_writev+0x376/0xba0 fs/read_write.c:1050 do_pwritev fs/read_write.c:1146 [inline] __do_sys_pwritev2 fs/read_write.c:1204 [inline] __se_sys_pwritev2+0x196/0x2b0 fs/read_write.c:1195 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f1281f85d29 RSP: 002b:00007f12819fe038 EFLAGS: 00000246 ORIG_RAX: 0000000000000148 RAX: ffffffffffffffda RBX: 00007f1282176080 RCX: 00007f1281f85d29 RDX: 0000000000000001 RSI: 0000000020000240 RDI: 0000000000000005 RBP: 00007f12819fe090 R08: 0000000000000000 R09: 0000000000000003 R10: 0000000000007000 R11: 0000000000000246 R12: 0000000000000002 R13: 0000000000000000 R14: 00007f1282176080 R15: 00007ffcb9e23328 </TASK> BTRFS error (device loop0 state A): Transaction aborted (error -12) BTRFS: error (device loop0 state A ---truncated---
Impacted products
Vendor Product Version
Linux Linux Version: 52b1fdca23ac0fbcad363a1a5b426bf0d56b715a
Version: 52b1fdca23ac0fbcad363a1a5b426bf0d56b715a
Version: 52b1fdca23ac0fbcad363a1a5b426bf0d56b715a
Version: 52b1fdca23ac0fbcad363a1a5b426bf0d56b715a
Create a notification for this product.
   Linux Linux Version: 6.5
Create a notification for this product.
Show details on NVD website


{
   containers: {
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Linux",
               programFiles: [
                  "fs/btrfs/ordered-data.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     lessThan: "927b930f117bbae730a853c1dc43da8afe8380fa",
                     status: "affected",
                     version: "52b1fdca23ac0fbcad363a1a5b426bf0d56b715a",
                     versionType: "git",
                  },
                  {
                     lessThan: "0ff88c2a742a7cbaa4d08507d864737d099b435a",
                     status: "affected",
                     version: "52b1fdca23ac0fbcad363a1a5b426bf0d56b715a",
                     versionType: "git",
                  },
                  {
                     lessThan: "8ea8db4216d1029527ab4666f730650419451e32",
                     status: "affected",
                     version: "52b1fdca23ac0fbcad363a1a5b426bf0d56b715a",
                     versionType: "git",
                  },
                  {
                     lessThan: "0d85f5c2dd91df6b5da454406756f463ba923b69",
                     status: "affected",
                     version: "52b1fdca23ac0fbcad363a1a5b426bf0d56b715a",
                     versionType: "git",
                  },
               ],
            },
            {
               defaultStatus: "affected",
               product: "Linux",
               programFiles: [
                  "fs/btrfs/ordered-data.c",
               ],
               repo: "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
               vendor: "Linux",
               versions: [
                  {
                     status: "affected",
                     version: "6.5",
                  },
                  {
                     lessThan: "6.5",
                     status: "unaffected",
                     version: "0",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.6.*",
                     status: "unaffected",
                     version: "6.6.78",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.12.*",
                     status: "unaffected",
                     version: "6.12.14",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "6.13.*",
                     status: "unaffected",
                     version: "6.13.3",
                     versionType: "semver",
                  },
                  {
                     lessThanOrEqual: "*",
                     status: "unaffected",
                     version: "6.14",
                     versionType: "original_commit_for_fix",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix assertion failure when splitting ordered extent after transaction abort\n\nIf while we are doing a direct IO write a transaction abort happens, we\nmark all existing ordered extents with the BTRFS_ORDERED_IOERR flag (done\nat btrfs_destroy_ordered_extents()), and then after that if we enter\nbtrfs_split_ordered_extent() and the ordered extent has bytes left\n(meaning we have a bio that doesn't cover the whole ordered extent, see\ndetails at btrfs_extract_ordered_extent()), we will fail on the following\nassertion at btrfs_split_ordered_extent():\n\n   ASSERT(!(flags & ~BTRFS_ORDERED_TYPE_FLAGS));\n\nbecause the BTRFS_ORDERED_IOERR flag is set and the definition of\nBTRFS_ORDERED_TYPE_FLAGS is just the union of all flags that identify the\ntype of write (regular, nocow, prealloc, compressed, direct IO, encoded).\n\nFix this by returning an error from btrfs_extract_ordered_extent() if we\nfind the BTRFS_ORDERED_IOERR flag in the ordered extent. The error will\nbe the error that resulted in the transaction abort or -EIO if no\ntransaction abort happened.\n\nThis was recently reported by syzbot with the following trace:\n\n   FAULT_INJECTION: forcing a failure.\n   name failslab, interval 1, probability 0, space 0, times 1\n   CPU: 0 UID: 0 PID: 5321 Comm: syz.0.0 Not tainted 6.13.0-rc5-syzkaller #0\n   Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014\n   Call Trace:\n    <TASK>\n    __dump_stack lib/dump_stack.c:94 [inline]\n    dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120\n    fail_dump lib/fault-inject.c:53 [inline]\n    should_fail_ex+0x3b0/0x4e0 lib/fault-inject.c:154\n    should_failslab+0xac/0x100 mm/failslab.c:46\n    slab_pre_alloc_hook mm/slub.c:4072 [inline]\n    slab_alloc_node mm/slub.c:4148 [inline]\n    __do_kmalloc_node mm/slub.c:4297 [inline]\n    __kmalloc_noprof+0xdd/0x4c0 mm/slub.c:4310\n    kmalloc_noprof include/linux/slab.h:905 [inline]\n    kzalloc_noprof include/linux/slab.h:1037 [inline]\n    btrfs_chunk_alloc_add_chunk_item+0x244/0x1100 fs/btrfs/volumes.c:5742\n    reserve_chunk_space+0x1ca/0x2c0 fs/btrfs/block-group.c:4292\n    check_system_chunk fs/btrfs/block-group.c:4319 [inline]\n    do_chunk_alloc fs/btrfs/block-group.c:3891 [inline]\n    btrfs_chunk_alloc+0x77b/0xf80 fs/btrfs/block-group.c:4187\n    find_free_extent_update_loop fs/btrfs/extent-tree.c:4166 [inline]\n    find_free_extent+0x42d1/0x5810 fs/btrfs/extent-tree.c:4579\n    btrfs_reserve_extent+0x422/0x810 fs/btrfs/extent-tree.c:4672\n    btrfs_new_extent_direct fs/btrfs/direct-io.c:186 [inline]\n    btrfs_get_blocks_direct_write+0x706/0xfa0 fs/btrfs/direct-io.c:321\n    btrfs_dio_iomap_begin+0xbb7/0x1180 fs/btrfs/direct-io.c:525\n    iomap_iter+0x697/0xf60 fs/iomap/iter.c:90\n    __iomap_dio_rw+0xeb9/0x25b0 fs/iomap/direct-io.c:702\n    btrfs_dio_write fs/btrfs/direct-io.c:775 [inline]\n    btrfs_direct_write+0x610/0xa30 fs/btrfs/direct-io.c:880\n    btrfs_do_write_iter+0x2a0/0x760 fs/btrfs/file.c:1397\n    do_iter_readv_writev+0x600/0x880\n    vfs_writev+0x376/0xba0 fs/read_write.c:1050\n    do_pwritev fs/read_write.c:1146 [inline]\n    __do_sys_pwritev2 fs/read_write.c:1204 [inline]\n    __se_sys_pwritev2+0x196/0x2b0 fs/read_write.c:1195\n    do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n    do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n    entry_SYSCALL_64_after_hwframe+0x77/0x7f\n   RIP: 0033:0x7f1281f85d29\n   RSP: 002b:00007f12819fe038 EFLAGS: 00000246 ORIG_RAX: 0000000000000148\n   RAX: ffffffffffffffda RBX: 00007f1282176080 RCX: 00007f1281f85d29\n   RDX: 0000000000000001 RSI: 0000000020000240 RDI: 0000000000000005\n   RBP: 00007f12819fe090 R08: 0000000000000000 R09: 0000000000000003\n   R10: 0000000000007000 R11: 0000000000000246 R12: 0000000000000002\n   R13: 0000000000000000 R14: 00007f1282176080 R15: 00007ffcb9e23328\n    </TASK>\n   BTRFS error (device loop0 state A): Transaction aborted (error -12)\n   BTRFS: error (device loop0 state A\n---truncated---",
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-03-24T15:39:52.145Z",
            orgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
            shortName: "Linux",
         },
         references: [
            {
               url: "https://git.kernel.org/stable/c/927b930f117bbae730a853c1dc43da8afe8380fa",
            },
            {
               url: "https://git.kernel.org/stable/c/0ff88c2a742a7cbaa4d08507d864737d099b435a",
            },
            {
               url: "https://git.kernel.org/stable/c/8ea8db4216d1029527ab4666f730650419451e32",
            },
            {
               url: "https://git.kernel.org/stable/c/0d85f5c2dd91df6b5da454406756f463ba923b69",
            },
         ],
         title: "btrfs: fix assertion failure when splitting ordered extent after transaction abort",
         x_generator: {
            engine: "bippy-5f407fcff5a0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
      assignerShortName: "Linux",
      cveId: "CVE-2025-21754",
      datePublished: "2025-02-27T02:12:23.738Z",
      dateReserved: "2024-12-29T08:45:45.760Z",
      dateUpdated: "2025-03-24T15:39:52.145Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2025-21754\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-02-27T03:15:16.050\",\"lastModified\":\"2025-02-27T03:15:16.050\",\"vulnStatus\":\"Received\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nbtrfs: fix assertion failure when splitting ordered extent after transaction abort\\n\\nIf while we are doing a direct IO write a transaction abort happens, we\\nmark all existing ordered extents with the BTRFS_ORDERED_IOERR flag (done\\nat btrfs_destroy_ordered_extents()), and then after that if we enter\\nbtrfs_split_ordered_extent() and the ordered extent has bytes left\\n(meaning we have a bio that doesn't cover the whole ordered extent, see\\ndetails at btrfs_extract_ordered_extent()), we will fail on the following\\nassertion at btrfs_split_ordered_extent():\\n\\n   ASSERT(!(flags & ~BTRFS_ORDERED_TYPE_FLAGS));\\n\\nbecause the BTRFS_ORDERED_IOERR flag is set and the definition of\\nBTRFS_ORDERED_TYPE_FLAGS is just the union of all flags that identify the\\ntype of write (regular, nocow, prealloc, compressed, direct IO, encoded).\\n\\nFix this by returning an error from btrfs_extract_ordered_extent() if we\\nfind the BTRFS_ORDERED_IOERR flag in the ordered extent. The error will\\nbe the error that resulted in the transaction abort or -EIO if no\\ntransaction abort happened.\\n\\nThis was recently reported by syzbot with the following trace:\\n\\n   FAULT_INJECTION: forcing a failure.\\n   name failslab, interval 1, probability 0, space 0, times 1\\n   CPU: 0 UID: 0 PID: 5321 Comm: syz.0.0 Not tainted 6.13.0-rc5-syzkaller #0\\n   Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014\\n   Call Trace:\\n    <TASK>\\n    __dump_stack lib/dump_stack.c:94 [inline]\\n    dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120\\n    fail_dump lib/fault-inject.c:53 [inline]\\n    should_fail_ex+0x3b0/0x4e0 lib/fault-inject.c:154\\n    should_failslab+0xac/0x100 mm/failslab.c:46\\n    slab_pre_alloc_hook mm/slub.c:4072 [inline]\\n    slab_alloc_node mm/slub.c:4148 [inline]\\n    __do_kmalloc_node mm/slub.c:4297 [inline]\\n    __kmalloc_noprof+0xdd/0x4c0 mm/slub.c:4310\\n    kmalloc_noprof include/linux/slab.h:905 [inline]\\n    kzalloc_noprof include/linux/slab.h:1037 [inline]\\n    btrfs_chunk_alloc_add_chunk_item+0x244/0x1100 fs/btrfs/volumes.c:5742\\n    reserve_chunk_space+0x1ca/0x2c0 fs/btrfs/block-group.c:4292\\n    check_system_chunk fs/btrfs/block-group.c:4319 [inline]\\n    do_chunk_alloc fs/btrfs/block-group.c:3891 [inline]\\n    btrfs_chunk_alloc+0x77b/0xf80 fs/btrfs/block-group.c:4187\\n    find_free_extent_update_loop fs/btrfs/extent-tree.c:4166 [inline]\\n    find_free_extent+0x42d1/0x5810 fs/btrfs/extent-tree.c:4579\\n    btrfs_reserve_extent+0x422/0x810 fs/btrfs/extent-tree.c:4672\\n    btrfs_new_extent_direct fs/btrfs/direct-io.c:186 [inline]\\n    btrfs_get_blocks_direct_write+0x706/0xfa0 fs/btrfs/direct-io.c:321\\n    btrfs_dio_iomap_begin+0xbb7/0x1180 fs/btrfs/direct-io.c:525\\n    iomap_iter+0x697/0xf60 fs/iomap/iter.c:90\\n    __iomap_dio_rw+0xeb9/0x25b0 fs/iomap/direct-io.c:702\\n    btrfs_dio_write fs/btrfs/direct-io.c:775 [inline]\\n    btrfs_direct_write+0x610/0xa30 fs/btrfs/direct-io.c:880\\n    btrfs_do_write_iter+0x2a0/0x760 fs/btrfs/file.c:1397\\n    do_iter_readv_writev+0x600/0x880\\n    vfs_writev+0x376/0xba0 fs/read_write.c:1050\\n    do_pwritev fs/read_write.c:1146 [inline]\\n    __do_sys_pwritev2 fs/read_write.c:1204 [inline]\\n    __se_sys_pwritev2+0x196/0x2b0 fs/read_write.c:1195\\n    do_syscall_x64 arch/x86/entry/common.c:52 [inline]\\n    do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\\n    entry_SYSCALL_64_after_hwframe+0x77/0x7f\\n   RIP: 0033:0x7f1281f85d29\\n   RSP: 002b:00007f12819fe038 EFLAGS: 00000246 ORIG_RAX: 0000000000000148\\n   RAX: ffffffffffffffda RBX: 00007f1282176080 RCX: 00007f1281f85d29\\n   RDX: 0000000000000001 RSI: 0000000020000240 RDI: 0000000000000005\\n   RBP: 00007f12819fe090 R08: 0000000000000000 R09: 0000000000000003\\n   R10: 0000000000007000 R11: 0000000000000246 R12: 0000000000000002\\n   R13: 0000000000000000 R14: 00007f1282176080 R15: 00007ffcb9e23328\\n    </TASK>\\n   BTRFS error (device loop0 state A): Transaction aborted (error -12)\\n   BTRFS: error (device loop0 state A\\n---truncated---\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/0d85f5c2dd91df6b5da454406756f463ba923b69\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/0ff88c2a742a7cbaa4d08507d864737d099b435a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/8ea8db4216d1029527ab4666f730650419451e32\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/927b930f117bbae730a853c1dc43da8afe8380fa\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}",
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.