xfs: stop reclaim before pushing AIL during unmount
Summary
| CVE | CVE-2026-31455 |
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-22 14:16:40 UTC |
| Updated | 2026-04-22 14:16:40 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved:
xfs: stop reclaim before pushing AIL during unmount
The unmount sequence in xfs_unmount_flush_inodes() pushed the AIL while
background reclaim and inodegc are still running. This is broken
independently of any use-after-free issues - background reclaim and
inodegc should not be running while the AIL is being pushed during
unmount, as inodegc can dirty and insert inodes into the AIL during the
flush, and background reclaim can race to abort and free dirty inodes.
Reorder xfs_unmount_flush_inodes() to stop inodegc and cancel background
reclaim before pushing the AIL. Stop inodegc before cancelling
m_reclaim_work because the inodegc worker can re-queue m_reclaim_work
via xfs_inodegc_set_reclaimable. |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|
| CNA |
Linux |
Linux |
affected 90c60e16401248a4900f3f9387f563d0178dcf34 e6cc490048f78b009259a5f032acead9f789c34c git |
Not specified |
| CNA |
Linux |
Linux |
affected 90c60e16401248a4900f3f9387f563d0178dcf34 239d734c00644072862fa833805c4471573b1445 git |
Not specified |
| CNA |
Linux |
Linux |
affected 90c60e16401248a4900f3f9387f563d0178dcf34 bda27fc0b4eb3a425d9a18475c4cb94fbe862c60 git |
Not specified |
| CNA |
Linux |
Linux |
affected 90c60e16401248a4900f3f9387f563d0178dcf34 d38135af04a3ad8a585c899d176efc8e97853115 git |
Not specified |
| CNA |
Linux |
Linux |
affected 90c60e16401248a4900f3f9387f563d0178dcf34 a89434a6188d8430ea31120da96e3e4cefb58686 git |
Not specified |
| CNA |
Linux |
Linux |
affected 90c60e16401248a4900f3f9387f563d0178dcf34 8147e304d7d32fd5c3e943babc296ce2873dc279 git |
Not specified |
| CNA |
Linux |
Linux |
affected 90c60e16401248a4900f3f9387f563d0178dcf34 558e3275d8a3b101be18a7fe7d1634053e9d9b07 git |
Not specified |
| CNA |
Linux |
Linux |
affected 90c60e16401248a4900f3f9387f563d0178dcf34 4f24a767e3d64a5f58c595b5c29b6063a201f1e3 git |
Not specified |
| CNA |
Linux |
Linux |
affected 5.9 |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.9 semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.10.253 5.10.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.15.203 5.15.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.1.168 6.1.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.6.131 6.6.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.12.80 6.12.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.18.21 6.18.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.19.11 6.19.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 7.0 * original_commit_for_fix |
Not specified |
References
| Reference | Source | Link | Tags |
|---|
| git.kernel.org/stable/c/bda27fc0b4eb3a425d9a18475c4cb94fbe862c60 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/239d734c00644072862fa833805c4471573b1445 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/e6cc490048f78b009259a5f032acead9f789c34c |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/d38135af04a3ad8a585c899d176efc8e97853115 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/8147e304d7d32fd5c3e943babc296ce2873dc279 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/a89434a6188d8430ea31120da96e3e4cefb58686 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/4f24a767e3d64a5f58c595b5c29b6063a201f1e3 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/558e3275d8a3b101be18a7fe7d1634053e9d9b07 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.