Acknowledged
Created: Dec 16, 2025
Updated: Dec 18, 2025
Found In Version: 10.25.33.1
Severity: Standard
Applicable for: Wind River Linux LTS 25
Component/s: Kernel
In the Linux kernel, the following vulnerability has been resolved:[EOL][EOL]ext4: add i_data_sem protection in ext4_destroy_inline_data_nolock()[EOL][EOL]Fix a race between inline data destruction and block mapping.[EOL][EOL]The function ext4_destroy_inline_data_nolock() changes the inode data[EOL]layout by clearing EXT4_INODE_INLINE_DATA and setting EXT4_INODE_EXTENTS.[EOL]At the same time, another thread may execute ext4_map_blocks(), which[EOL]tests EXT4_INODE_EXTENTS to decide whether to call ext4_ext_map_blocks()[EOL]or ext4_ind_map_blocks().[EOL][EOL]Without i_data_sem protection, ext4_ind_map_blocks() may receive inode[EOL]with EXT4_INODE_EXTENTS flag and triggering assert.[EOL][EOL]kernel BUG at fs/ext4/indirect.c:546![EOL]EXT4-fs (loop2): unmounting filesystem.[EOL]invalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI[EOL]Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014[EOL]RIP: 0010:ext4_ind_map_blocks.cold+0x2b/0x5a fs/ext4/indirect.c:546[EOL][EOL]Call Trace:[EOL] <TASK>[EOL] ext4_map_blocks+0xb9b/0x16f0 fs/ext4/inode.c:681[EOL] _ext4_get_block+0x242/0x590 fs/ext4/inode.c:822[EOL] ext4_block_write_begin+0x48b/0x12c0 fs/ext4/inode.c:1124[EOL] ext4_write_begin+0x598/0xef0 fs/ext4/inode.c:1255[EOL] ext4_da_write_begin+0x21e/0x9c0 fs/ext4/inode.c:3000[EOL] generic_perform_write+0x259/0x5d0 mm/filemap.c:3846[EOL] ext4_buffered_write_iter+0x15b/0x470 fs/ext4/file.c:285[EOL] ext4_file_write_iter+0x8e0/0x17f0 fs/ext4/file.c:679[EOL] call_write_iter include/linux/fs.h:2271 [inline][EOL] do_iter_readv_writev+0x212/0x3c0 fs/read_write.c:735[EOL] do_iter_write+0x186/0x710 fs/read_write.c:861[EOL] vfs_iter_write+0x70/0xa0 fs/read_write.c:902[EOL] iter_file_splice_write+0x73b/0xc90 fs/splice.c:685[EOL] do_splice_from fs/splice.c:763 [inline][EOL] direct_splice_actor+0x10f/0x170 fs/splice.c:950[EOL] splice_direct_to_actor+0x33a/0xa10 fs/splice.c:896[EOL] do_splice_direct+0x1a9/0x280 fs/splice.c:1002[EOL] do_sendfile+0xb13/0x12c0 fs/read_write.c:1255[EOL] __do_sys_sendfile64 fs/read_write.c:1323 [inline][EOL] __se_sys_sendfile64 fs/read_write.c:1309 [inline][EOL] __x64_sys_sendfile64+0x1cf/0x210 fs/read_write.c:1309[EOL] do_syscall_x64 arch/x86/entry/common.c:51 [inline][EOL] do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81[EOL] entry_SYSCALL_64_after_hwframe+0x6e/0xd8