In the Linux kernel, the following vulnerability has been resolved:
nfsd: map the EBADMSG to nfserr_io to avoid warning
Ext4 will throw -EBADMSG through ext4_readdir when a checksum error occurs, resulting in the following WARNING.
Fix it by mapping EBADMSG to nfserr_io.
nfsdbufferedreaddir iteratedir // -EBADMSG -74 ext4readdir // .iterateshared ext4dxreaddir ext4htreefilltree htreedirblocktotree ext4readdirblock _ext4readdirblock ext4dirblockcsumverify warnnospaceforcsum _warnnospaceforcsum return ERR_PTR(-EFSBADCRC) // -EBADMSG -74 nfserrno // WARNING
[ 161.115610] ------------[ cut here ]------------ [ 161.116465] nfsd: non-standard errno: -74 [ 161.117315] WARNING: CPU: 1 PID: 780 at fs/nfsd/nfsproc.c:878 nfserrno+0x9d/0xd0 [ 161.118596] Modules linked in: [ 161.119243] CPU: 1 PID: 780 Comm: nfsd Not tainted 5.10.0-00014-g79679361fd5d #138 [ 161.120684] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qe mu.org 04/01/2014 [ 161.123601] RIP: 0010:nfserrno+0x9d/0xd0 [ 161.124676] Code: 0f 87 da 30 dd 00 83 e3 01 b8 00 00 00 05 75 d7 44 89 ee 48 c7 c7 c0 57 24 98 89 44 24 04 c6 05 ce 2b 61 03 01 e8 99 20 d8 00 <0f> 0b 8b 44 24 04 eb b5 4c 89 e6 48 c7 c7 a0 6d a4 99 e8 cc 15 33 [ 161.127797] RSP: 0018:ffffc90000e2f9c0 EFLAGS: 00010286 [ 161.128794] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 161.130089] RDX: 1ffff1103ee16f6d RSI: 0000000000000008 RDI: fffff520001c5f2a [ 161.131379] RBP: 0000000000000022 R08: 0000000000000001 R09: ffff8881f70c1827 [ 161.132664] R10: ffffed103ee18304 R11: 0000000000000001 R12: 0000000000000021 [ 161.133949] R13: 00000000ffffffb6 R14: ffff8881317c0000 R15: ffffc90000e2fbd8 [ 161.135244] FS: 0000000000000000(0000) GS:ffff8881f7080000(0000) knlGS:0000000000000000 [ 161.136695] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 161.137761] CR2: 00007fcaad70b348 CR3: 0000000144256006 CR4: 0000000000770ee0 [ 161.139041] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 161.140291] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 161.141519] PKRU: 55555554 [ 161.142076] Call Trace: [ 161.142575] ? _warn+0x9b/0x140 [ 161.143229] ? nfserrno+0x9d/0xd0 [ 161.143872] ? reportbug+0x125/0x150 [ 161.144595] ? handlebug+0x41/0x90 [ 161.145284] ? excinvalidop+0x14/0x70 [ 161.146009] ? asmexcinvalidop+0x12/0x20 [ 161.146816] ? nfserrno+0x9d/0xd0 [ 161.147487] nfsdbufferedreaddir+0x28b/0x2b0 [ 161.148333] ? nfsd4encodedirentfattr+0x380/0x380 [ 161.149258] ? nfsdbufferedfilldir+0xf0/0xf0 [ 161.150093] ? waitforconcurrentwrites+0x170/0x170 [ 161.151004] ? genericfilellseeksize+0x48/0x160 [ 161.151895] nfsdreaddir+0x132/0x190 [ 161.152606] ? nfsd4encodedirentfattr+0x380/0x380 [ 161.153516] ? nfsdunlink+0x380/0x380 [ 161.154256] ? overridecreds+0x45/0x60 [ 161.155006] nfsd4encodereaddir+0x21a/0x3d0 [ 161.155850] ? nfsd4encodereadlink+0x210/0x210 [ 161.156731] ? writebytestoxdrbuf+0x97/0xe0 [ 161.157598] ? _writebytestoxdrbuf+0xd0/0xd0 [ 161.158494] ? lockdowngrade+0x90/0x90 [ 161.159232] ? nfs4svcdecodevoidarg+0x10/0x10 [ 161.160092] nfsd4encodeoperation+0x15a/0x440 [ 161.160959] nfsd4proccompound+0x718/0xe90 [ 161.161818] nfsddispatch+0x18e/0x2c0 [ 161.162586] svcprocesscommon+0x786/0xc50 [ 161.163403] ? nfsdsvc+0x380/0x380 [ 161.164137] ? svcprintk+0x160/0x160 [ 161.164846] ? svcxprtdoenqueue.part.0+0x365/0x380 [ 161.165808] ? nfsdsvc+0x380/0x380 [ 161.166523] ? rcuiswatching+0x23/0x40 [ 161.167309] svcprocess+0x1a5/0x200 [ 161.168019] nfsd+0x1f5/0x380 [ 161.168663] ? nfsdshutdownthreads+0x260/0x260 [ 161.169554] kthread+0x1c4/0x210 [ 161.170224] ? kthreadinsertworksanitycheck+0x80/0x80 [ 161.171246] retfrom_fork+0x1f/0x30