In the Linux kernel, the following vulnerability has been resolved:
nilfs2: fix state management in error path of log writing function
After commit a694291a6211 ("nilfs2: separate wait function from
nilfs_segctor_write") was applied, the log writing function
nilfs_segctor_do_construct() was able to issue I/O requests continuously
even if user data blocks were split into multiple logs across segments,
but two potential flaws were introduced in its error handling.
First, if nilfs_segctor_begin_construction() fails while creating the
second or subsequent logs, the log writing function returns without
calling nilfs_segctor_abort_construction(), so the writeback flag set on
pages/folios will remain uncleared. This causes page cache operations to
hang waiting for the writeback flag. For example,
truncate_inode_pages_final(), which is called via nilfs_evict_inode() when
an inode is evicted from memory, will hang.
Second, the NILFS_I_COLLECTED flag set on normal inodes remain uncleared.
As a result, if the next log write involves checkpoint creation, that's
fine, but if a partial log write is performed that does not, inodes with
NILFS_I_COLLECTED set are erroneously removed from the "sc_dirty_files"
list, and their data and b-tree blocks may not be written to the device,
corrupting the block mapping.
Fix these issues by uniformly calling nilfs_segctor_abort_construction()
on failure of each step in the loop in nilfs_segctor_do_construct(),
having it clean up logs and segment usages according to progress, and
correcting the conditions for calling nilfs_redirty_inodes() to ensure
that the NILFS_I_COLLECTED flag is cleared.
References
Link | Resource |
---|---|
https://git.kernel.org/stable/c/036441e8438b29111fa75008f0ce305fb4e83c0a | Mailing List Patch |
https://git.kernel.org/stable/c/0a1a961bde4351dc047ffdeb2f1311ca16a700cc | Mailing List Patch |
https://git.kernel.org/stable/c/30562eff4a6dd35c4b5be9699ef61ad9f5f20a06 | Mailing List Patch |
https://git.kernel.org/stable/c/3e349d7191f0688fc9808ef24fd4e4b4ef5ca876 | Mailing List Patch |
https://git.kernel.org/stable/c/40a2757de2c376ef8a08d9ee9c81e77f3c750adf | Mailing List Patch |
https://git.kernel.org/stable/c/6576dd6695f2afca3f4954029ac4a64f82ba60ab | Mailing List Patch |
https://git.kernel.org/stable/c/74866c16ea2183f52925fa5d76061a1fe7f7737b | Mailing List Patch |
https://git.kernel.org/stable/c/efdde00d4a1ef10bb71e09ebc67823a3d3ad725b | Mailing List Patch |
Configurations
Configuration 1 (hide)
|
History
21 Oct 2024, 13:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/036441e8438b29111fa75008f0ce305fb4e83c0a - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/0a1a961bde4351dc047ffdeb2f1311ca16a700cc - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/30562eff4a6dd35c4b5be9699ef61ad9f5f20a06 - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/3e349d7191f0688fc9808ef24fd4e4b4ef5ca876 - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/40a2757de2c376ef8a08d9ee9c81e77f3c750adf - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/6576dd6695f2afca3f4954029ac4a64f82ba60ab - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/74866c16ea2183f52925fa5d76061a1fe7f7737b - Mailing List, Patch | |
References | () https://git.kernel.org/stable/c/efdde00d4a1ef10bb71e09ebc67823a3d3ad725b - Mailing List, Patch | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:* |
|
CWE | NVD-CWE-noinfo | |
First Time |
Linux linux Kernel
Linux |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
10 Oct 2024, 12:51
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
09 Oct 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-09 15:15
Updated : 2024-10-21 13:28
NVD link : CVE-2024-47669
Mitre link : CVE-2024-47669
CVE.ORG link : CVE-2024-47669
JSON object : View
Products Affected
linux
- linux_kernel
CWE