๐Ÿ” CVE Alert

CVE-2026-31598

UNKNOWN 0.0

ocfs2: fix possible deadlock between unlink and dio_end_io_write

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix possible deadlock between unlink and dio_end_io_write ocfs2_unlink takes orphan dir inode_lock first and then ip_alloc_sem, while in ocfs2_dio_end_io_write, it acquires these locks in reverse order. This creates an ABBA lock ordering violation on lock classes ocfs2_sysfile_lock_key[ORPHAN_DIR_SYSTEM_INODE] and ocfs2_file_ip_alloc_sem_key. Lock Chain #0 (orphan dir inode_lock -> ip_alloc_sem): ocfs2_unlink ocfs2_prepare_orphan_dir ocfs2_lookup_lock_orphan_dir inode_lock(orphan_dir_inode) <- lock A __ocfs2_prepare_orphan_dir ocfs2_prepare_dir_for_insert ocfs2_extend_dir ocfs2_expand_inline_dir down_write(&oi->ip_alloc_sem) <- Lock B Lock Chain #1 (ip_alloc_sem -> orphan dir inode_lock): ocfs2_dio_end_io_write down_write(&oi->ip_alloc_sem) <- Lock B ocfs2_del_inode_from_orphan() inode_lock(orphan_dir_inode) <- Lock A Deadlock Scenario: CPU0 (unlink) CPU1 (dio_end_io_write) ------ ------ inode_lock(orphan_dir_inode) down_write(ip_alloc_sem) down_write(ip_alloc_sem) inode_lock(orphan_dir_inode) Since ip_alloc_sem is to protect allocation changes, which is unrelated with operations in ocfs2_del_inode_from_orphan. So move ocfs2_del_inode_from_orphan out of ip_alloc_sem to fix the deadlock.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Apr 24, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 2b884d52273c60c298bd570163e8053657bbaff6 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < bc0fb5c7d54c78be43a536df0e20dee32adb27d3 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < f9fb1a7b635849322e1d7b7b6b26389778ec8e82 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < e049f7a9bd80b7319590789ea5e1c523d6339d91
Linux / Linux
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/2b884d52273c60c298bd570163e8053657bbaff6 git.kernel.org: https://git.kernel.org/stable/c/bc0fb5c7d54c78be43a536df0e20dee32adb27d3 git.kernel.org: https://git.kernel.org/stable/c/f9fb1a7b635849322e1d7b7b6b26389778ec8e82 git.kernel.org: https://git.kernel.org/stable/c/e049f7a9bd80b7319590789ea5e1c523d6339d91