CVE-2026-31455
xfs: stop reclaim before pushing AIL during unmount
Description
In the Linux kernel, the following vulnerability has been resolved: xfs: stop reclaim before pushing AIL during unmount The unmount sequence in xfs_unmount_flush_inodes() pushed the AIL while background reclaim and inodegc are still running. This is broken independently of any use-after-free issues - background reclaim and inodegc should not be running while the AIL is being pushed during unmount, as inodegc can dirty and insert inodes into the AIL during the flush, and background reclaim can race to abort and free dirty inodes. Reorder xfs_unmount_flush_inodes() to stop inodegc and cancel background reclaim before pushing the AIL. Stop inodegc before cancelling m_reclaim_work because the inodegc worker can re-queue m_reclaim_work via xfs_inodegc_set_reclaimable.
INFO
Published Date :
April 22, 2026, 2:16 p.m.
Last Modified :
April 22, 2026, 2:16 p.m.
Remotely Exploit :
No
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Products
The following products are affected by CVE-2026-31455
vulnerability.
Even if cvefeed.io is aware of the exact versions of the
products
that
are
affected, the information is not represented in the table below.
No affected product recoded yet
Solution
- Stop inodegc before cancelling background reclaim.
- Push AIL after stopping reclaim and inodegc.
- Apply the patch for xfs_unmount_flush_inodes().
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2026-31455.
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2026-31455 is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2026-31455
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2026-31455 vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2026-31455 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Apr. 22, 2026
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: xfs: stop reclaim before pushing AIL during unmount The unmount sequence in xfs_unmount_flush_inodes() pushed the AIL while background reclaim and inodegc are still running. This is broken independently of any use-after-free issues - background reclaim and inodegc should not be running while the AIL is being pushed during unmount, as inodegc can dirty and insert inodes into the AIL during the flush, and background reclaim can race to abort and free dirty inodes. Reorder xfs_unmount_flush_inodes() to stop inodegc and cancel background reclaim before pushing the AIL. Stop inodegc before cancelling m_reclaim_work because the inodegc worker can re-queue m_reclaim_work via xfs_inodegc_set_reclaimable. Added Reference https://git.kernel.org/stable/c/239d734c00644072862fa833805c4471573b1445 Added Reference https://git.kernel.org/stable/c/4f24a767e3d64a5f58c595b5c29b6063a201f1e3 Added Reference https://git.kernel.org/stable/c/558e3275d8a3b101be18a7fe7d1634053e9d9b07 Added Reference https://git.kernel.org/stable/c/8147e304d7d32fd5c3e943babc296ce2873dc279 Added Reference https://git.kernel.org/stable/c/a89434a6188d8430ea31120da96e3e4cefb58686 Added Reference https://git.kernel.org/stable/c/bda27fc0b4eb3a425d9a18475c4cb94fbe862c60 Added Reference https://git.kernel.org/stable/c/d38135af04a3ad8a585c899d176efc8e97853115 Added Reference https://git.kernel.org/stable/c/e6cc490048f78b009259a5f032acead9f789c34c