We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-37901

irqchip/qcom-mpm: Prevent crash when trying to handle non-wake GPIOs



Description

In the Linux kernel, the following vulnerability has been resolved: irqchip/qcom-mpm: Prevent crash when trying to handle non-wake GPIOs On Qualcomm chipsets not all GPIOs are wakeup capable. Those GPIOs do not have a corresponding MPM pin and should not be handled inside the MPM driver. The IRQ domain hierarchy is always applied, so it's required to explicitly disconnect the hierarchy for those. The pinctrl-msm driver marks these with GPIO_NO_WAKE_IRQ. qcom-pdc has a check for this, but irq-qcom-mpm is currently missing the check. This is causing crashes when setting up interrupts for non-wake GPIOs: root@rb1:~# gpiomon -c gpiochip1 10 irq: IRQ159: trimming hierarchy from :soc@0:interrupt-controller@f200000-1 Unable to handle kernel paging request at virtual address ffff8000a1dc3820 Hardware name: Qualcomm Technologies, Inc. Robotics RB1 (DT) pc : mpm_set_type+0x80/0xcc lr : mpm_set_type+0x5c/0xcc Call trace: mpm_set_type+0x80/0xcc (P) qcom_mpm_set_type+0x64/0x158 irq_chip_set_type_parent+0x20/0x38 msm_gpio_irq_set_type+0x50/0x530 __irq_set_trigger+0x60/0x184 __setup_irq+0x304/0x6bc request_threaded_irq+0xc8/0x19c edge_detector_setup+0x260/0x364 linereq_create+0x420/0x5a8 gpio_ioctl+0x2d4/0x6c0 Fix this by copying the check for GPIO_NO_WAKE_IRQ from qcom-pdc.c, so that MPM is removed entirely from the hierarchy for non-wake GPIOs.

Reserved 2025-04-16 | Published 2025-05-20 | Updated 2025-05-26 | Assigner Linux

Product status

Default status
unaffected

a6199bb514d8a63f61c2a22c1f912376e14d0fb2 before 45aced97f01d5ab14c8a2a60f6748f18c501c3f5
affected

a6199bb514d8a63f61c2a22c1f912376e14d0fb2 before dfbaecf7e38f5e9bfa5e47a1e525ffbb58bab8cf
affected

a6199bb514d8a63f61c2a22c1f912376e14d0fb2 before f102342360950b56959e5fff4a874ea88ae13758
affected

a6199bb514d8a63f61c2a22c1f912376e14d0fb2 before d5c10448f411a925dd59005785cb971f0626e032
affected

a6199bb514d8a63f61c2a22c1f912376e14d0fb2 before 38a05c0b87833f5b188ae43b428b1f792df2b384
affected

Default status
affected

5.18
affected

Any version before 5.18
unaffected

6.1.138
unaffected

6.6.90
unaffected

6.12.28
unaffected

6.14.6
unaffected

6.15
unaffected

References

git.kernel.org/...c/45aced97f01d5ab14c8a2a60f6748f18c501c3f5

git.kernel.org/...c/dfbaecf7e38f5e9bfa5e47a1e525ffbb58bab8cf

git.kernel.org/...c/f102342360950b56959e5fff4a874ea88ae13758

git.kernel.org/...c/d5c10448f411a925dd59005785cb971f0626e032

git.kernel.org/...c/38a05c0b87833f5b188ae43b428b1f792df2b384

cve.org (CVE-2025-37901)

nvd.nist.gov (CVE-2025-37901)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-37901

Support options

Helpdesk Chat, Email, Knowledgebase