CVE-2021-47492
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
22/05/2024
Last modified:
29/09/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mm, thp: bail out early in collapse_file for writeback page<br />
<br />
Currently collapse_file does not explicitly check PG_writeback, instead,<br />
page_has_private and try_to_release_page are used to filter writeback<br />
pages. This does not work for xfs with blocksize equal to or larger<br />
than pagesize, because in such case xfs has no page->private.<br />
<br />
This makes collapse_file bail out early for writeback page. Otherwise,<br />
xfs end_page_writeback will panic as follows.<br />
<br />
page:fffffe00201bcc80 refcount:0 mapcount:0 mapping:ffff0003f88c86a8 index:0x0 pfn:0x84ef32<br />
aops:xfs_address_space_operations [xfs] ino:30000b7 dentry name:"libtest.so"<br />
flags: 0x57fffe0000008027(locked|referenced|uptodate|active|writeback)<br />
raw: 57fffe0000008027 ffff80001b48bc28 ffff80001b48bc28 ffff0003f88c86a8<br />
raw: 0000000000000000 0000000000000000 00000000ffffffff ffff0000c3e9a000<br />
page dumped because: VM_BUG_ON_PAGE(((unsigned int) page_ref_count(page) + 127u mem_cgroup:ffff0000c3e9a000<br />
------------[ cut here ]------------<br />
kernel BUG at include/linux/mm.h:1212!<br />
Internal error: Oops - BUG: 0 [#1] SMP<br />
Modules linked in:<br />
BUG: Bad page state in process khugepaged pfn:84ef32<br />
xfs(E)<br />
page:fffffe00201bcc80 refcount:0 mapcount:0 mapping:0 index:0x0 pfn:0x84ef32<br />
libcrc32c(E) rfkill(E) aes_ce_blk(E) crypto_simd(E) ...<br />
CPU: 25 PID: 0 Comm: swapper/25 Kdump: loaded Tainted: ...<br />
pstate: 60400005 (nZCv daif +PAN -UAO -TCO BTYPE=--)<br />
Call trace:<br />
end_page_writeback+0x1c0/0x214<br />
iomap_finish_page_writeback+0x13c/0x204<br />
iomap_finish_ioend+0xe8/0x19c<br />
iomap_writepage_end_bio+0x38/0x50<br />
bio_endio+0x168/0x1ec<br />
blk_update_request+0x278/0x3f0<br />
blk_mq_end_request+0x34/0x15c<br />
virtblk_request_done+0x38/0x74 [virtio_blk]<br />
blk_done_softirq+0xc4/0x110<br />
__do_softirq+0x128/0x38c<br />
__irq_exit_rcu+0x118/0x150<br />
irq_exit+0x1c/0x30<br />
__handle_domain_irq+0x8c/0xf0<br />
gic_handle_irq+0x84/0x108<br />
el1_irq+0xcc/0x180<br />
arch_cpu_idle+0x18/0x40<br />
default_idle_call+0x4c/0x1a0<br />
cpuidle_idle_call+0x168/0x1e0<br />
do_idle+0xb4/0x104<br />
cpu_startup_entry+0x30/0x9c<br />
secondary_start_kernel+0x104/0x180<br />
Code: d4210000 b0006161 910c8021 94013f4d (d4210000)<br />
---[ end trace 4a88c6a074082f8c ]---<br />
Kernel panic - not syncing: Oops - BUG: Fatal exception in interrupt
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.4 (including) | 5.10.77 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.14.16 (excluding) |
| cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:5.15:rc7:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/5e669d8ab30ab61dec3c36e27b4711f07611e6fc
- https://git.kernel.org/stable/c/69a7fa5cb0de06c8956b040f19a7248c8c8308ca
- https://git.kernel.org/stable/c/74c42e1baacf206338b1dd6b6199ac964512b5bb
- https://git.kernel.org/stable/c/5e669d8ab30ab61dec3c36e27b4711f07611e6fc
- https://git.kernel.org/stable/c/69a7fa5cb0de06c8956b040f19a7248c8c8308ca
- https://git.kernel.org/stable/c/74c42e1baacf206338b1dd6b6199ac964512b5bb



