Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-71290.json
JSON Data
https://api.test.osv.dev/v1/vulns/AZL-71290
Upstream
Published
2025-12-04T15:15:58Z
Modified
2026-04-01T05:21:45.189679Z
Summary
CVE-2025-40220 affecting package kernel for versions less than 6.6.117.1-1
Details

In the Linux kernel, the following vulnerability has been resolved:

fuse: fix livelock in synchronous file put from fuseblk workers

I observed a hang when running generic/323 against a fuseblk server. This test opens a file, initiates a lot of AIO writes to that file descriptor, and closes the file descriptor before the writes complete. Unsurprisingly, the AIO exerciser threads are mostly stuck waiting for responses from the fuseblk server:

cat /proc/372265/task/372313/stack

[<0>] requestwaitanswer+0x1fe/0x2a0 [fuse] [<0>] __fusesimplerequest+0xd3/0x2b0 [fuse] [<0>] fusedogetattr+0xfc/0x1f0 [fuse] [<0>] fusefilereaditer+0xbe/0x1c0 [fuse] [<0>] aioread+0x130/0x1e0 [<0>] iosubmitone+0x542/0x860 [<0>] _x64sysiosubmit+0x98/0x1a0 [<0>] dosyscall64+0x37/0xf0 [<0>] entrySYSCALL64afterhwframe+0x4b/0x53

But the /weird/ part is that the fuseblk server threads are waiting for responses from itself:

cat /proc/372210/task/372232/stack

[<0>] requestwaitanswer+0x1fe/0x2a0 [fuse] [<0>] __fusesimplerequest+0xd3/0x2b0 [fuse] [<0>] fuse_fileput+0x9a/0xd0 [fuse] [<0>] fuserelease+0x36/0x50 [fuse] [<0>] __fput+0xec/0x2b0 [<0>] taskworkrun+0x55/0x90 [<0>] syscallexittousermode+0xe9/0x100 [<0>] dosyscall64+0x43/0xf0 [<0>] entrySYSCALL64afterhwframe+0x4b/0x53

The fuseblk server is fuse2fs so there's nothing all that exciting in the server itself. So why is the fuse server calling fusefileput? The commit message for the fstest sheds some light on that:

"By closing the file descriptor before calling io_destroy, you pretty much guarantee that the last put on the ioctx will be done in interrupt context (during I/O completion).

Aha. AIO fgets a new struct file from the fd when it queues the ioctx. The completion of the FUSE_WRITE command from userspace causes the fuse server to call the AIO completion function. The completion puts the struct file, queuing a delayed fput to the fuse server task. When the fuse server task returns to userspace, it has to run the delayed fput, which in the case of a fuseblk server, it does synchronously.

Sending the FUSERELEASE command sychronously from fuse server threads is a bad idea because a client program can initiate enough simultaneous AIOs such that all the fuse server threads end up in delayedfput, and now there aren't any threads left to handle the queued fuse commands.

Fix this by only using asynchronous fputs when closing files, and leave a comment explaining why.

References

Affected packages

Azure Linux:3 / kernel

Package

Name
kernel
Purl
pkg:rpm/azure-linux/kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.6.117.1-1

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-71290.json"