Home

Description

In the Linux kernel, the following vulnerability has been resolved: slab: fix kmalloc_nolock() context check for PREEMPT_RT On PREEMPT_RT kernels, local_lock becomes a sleeping lock. The current check in kmalloc_nolock() only verifies we're not in NMI or hard IRQ context, but misses the case where preemption is disabled. When a BPF program runs from a tracepoint with preemption disabled (preempt_count > 0), kmalloc_nolock() proceeds to call local_lock_irqsave() which attempts to acquire a sleeping lock, triggering: BUG: sleeping function called from invalid context in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 6128 preempt_count: 2, expected: 0 Fix this by checking !preemptible() on PREEMPT_RT, which directly expresses the constraint that we cannot take a sleeping lock when preemption is disabled. This encompasses the previous checks for NMI and hard IRQ contexts while also catching cases where preemption is disabled.

PUBLISHED Reserved 2026-01-13 | Published 2026-02-14 | Updated 2026-02-14 | Assigner Linux

Product status

Default status
unaffected

af92793e52c3a99b828ed4bdd277fd3e11c18d08 (git) before f60ba4a97ae3f94e4818722ed2e4d260bbb17b44
affected

af92793e52c3a99b828ed4bdd277fd3e11c18d08 (git) before 99a3e3a1cfc93b8fe318c0a3a5cfb01f1d4ad53c
affected

Default status
affected

6.18
affected

Any version before 6.18
unaffected

6.18.8 (semver)
unaffected

6.19 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/f60ba4a97ae3f94e4818722ed2e4d260bbb17b44

git.kernel.org/...c/99a3e3a1cfc93b8fe318c0a3a5cfb01f1d4ad53c

cve.org (CVE-2026-23134)

nvd.nist.gov (CVE-2026-23134)

Download JSON