Home

Description

In the Linux kernel, the following vulnerability has been resolved: bpf: Reject sleepable kprobe_multi programs at attach time kprobe.multi programs run in atomic/RCU context and cannot sleep. However, bpf_kprobe_multi_link_attach() did not validate whether the program being attached had the sleepable flag set, allowing sleepable helpers such as bpf_copy_from_user() to be invoked from a non-sleepable context. This causes a "sleeping function called from invalid context" splat: BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:169 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1787, name: sudo preempt_count: 1, expected: 0 RCU nest depth: 2, expected: 0 Fix this by rejecting sleepable programs early in bpf_kprobe_multi_link_attach(), before any further processing.

PUBLISHED Reserved 2026-05-01 | Published 2026-05-01 | Updated 2026-05-01 | Assigner Linux

Product status

Default status
unaffected

0dcac272540613d41c05e89679e4ddb978b612f1 (git) before dc9a060d76c12b23c5f378ee115d5e5d03d8bbf3
affected

0dcac272540613d41c05e89679e4ddb978b612f1 (git) before f952157e695fd434bdc05af63a703bb082a78717
affected

0dcac272540613d41c05e89679e4ddb978b612f1 (git) before eb7024bfcc5f68ed11ed9dd4891a3073c15f04a8
affected

Default status
affected

5.18
affected

Any version before 5.18
unaffected

6.18.22 (semver)
unaffected

6.19.12 (semver)
unaffected

7.0 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/dc9a060d76c12b23c5f378ee115d5e5d03d8bbf3

git.kernel.org/...c/f952157e695fd434bdc05af63a703bb082a78717

git.kernel.org/...c/eb7024bfcc5f68ed11ed9dd4891a3073c15f04a8

cve.org (CVE-2026-43010)

nvd.nist.gov (CVE-2026-43010)

Download JSON