CVE-2022-50730
Unknown Unknown - Not Provided
Ext4 Warning Suppression for Race Condition During Inode Eviction

Publication date: 2025-12-24

Last updated on: 2025-12-24

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: ext4: silence the warning when evicting inode with dioread_nolock When evicting an inode with default dioread_nolock, it could be raced by the unwritten extents converting kworker after writeback some new allocated dirty blocks. It convert unwritten extents to written, the extents could be merged to upper level and free extent blocks, so it could mark the inode dirty again even this inode has been marked I_FREEING. But the inode->i_io_list check and warning in ext4_evict_inode() missing this corner case. Fortunately, ext4_evict_inode() will wait all extents converting finished before this check, so it will not lead to inode use-after-free problem, every thing is OK besides this warning. The WARN_ON_ONCE was originally designed for finding inode use-after-free issues in advance, but if we add current dioread_nolock case in, it will become not quite useful, so fix this warning by just remove this check. ====== WARNING: CPU: 7 PID: 1092 at fs/ext4/inode.c:227 ext4_evict_inode+0x875/0xc60 ... RIP: 0010:ext4_evict_inode+0x875/0xc60 ... Call Trace: <TASK> evict+0x11c/0x2b0 iput+0x236/0x3a0 do_unlinkat+0x1b4/0x490 __x64_sys_unlinkat+0x4c/0xb0 do_syscall_64+0x3b/0x90 entry_SYSCALL_64_after_hwframe+0x46/0xb0 RIP: 0033:0x7fa933c1115b ====== rm kworker ext4_end_io_end() vfs_unlink() ext4_unlink() ext4_convert_unwritten_io_end_vec() ext4_convert_unwritten_extents() ext4_map_blocks() ext4_ext_map_blocks() ext4_ext_try_to_merge_up() __mark_inode_dirty() check !I_FREEING locked_inode_to_wb_and_lock_list() iput() iput_final() evict() ext4_evict_inode() truncate_inode_pages_final() //wait release io_end inode_io_list_move_locked() ext4_release_io_end() trigger WARN_ON_ONCE()
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-24
Last Modified
2025-12-24
Generated
2026-05-07
AI Q&A
2025-12-24
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves a warning in the Linux kernel's ext4 filesystem code when evicting an inode with the dioread_nolock option. During eviction, a race condition can occur where unwritten extents are converted to written extents by a background worker after writeback of newly allocated dirty blocks. This can cause the inode to be marked dirty again even after it has been marked as freeing (I_FREEING). The original warning (WARN_ON_ONCE) was intended to detect inode use-after-free issues, but this race condition causes the warning to trigger incorrectly. The fix removes this warning check to avoid false positives, as the actual inode use-after-free problem does not occur due to waiting for all extent conversions to finish before the check.


How can this vulnerability impact me? :

The impact of this vulnerability is limited to a warning message being triggered in the kernel logs during inode eviction under certain conditions. It does not lead to inode use-after-free or memory corruption, so it does not cause system crashes or data corruption. Essentially, it is a false positive warning that has been silenced to avoid confusion and unnecessary concern.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability manifests as a warning in the Linux kernel logs related to ext4 inode eviction, specifically a WARN_ON_ONCE message at fs/ext4/inode.c:227 in ext4_evict_inode. To detect it, you can monitor your system logs (e.g., using dmesg or journalctl) for warnings containing 'ext4_evict_inode' or related ext4 warnings. Example commands: 'dmesg | grep ext4_evict_inode' or 'journalctl -k | grep ext4_evict_inode'.


What immediate steps should I take to mitigate this vulnerability?

Since this issue is a warning without leading to inode use-after-free or system instability, immediate mitigation involves updating the Linux kernel to a version where this warning has been fixed by removing the problematic check in ext4_evict_inode. Until then, monitoring logs for the warning and avoiding workloads that heavily trigger ext4 inode eviction may reduce occurrences.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart