๐Ÿ” CVE Alert

CVE-2025-37901

UNKNOWN 0.0

irqchip/qcom-mpm: Prevent crash when trying to handle non-wake GPIOs

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: irqchip/qcom-mpm: Prevent crash when trying to handle non-wake GPIOs On Qualcomm chipsets not all GPIOs are wakeup capable. Those GPIOs do not have a corresponding MPM pin and should not be handled inside the MPM driver. The IRQ domain hierarchy is always applied, so it's required to explicitly disconnect the hierarchy for those. The pinctrl-msm driver marks these with GPIO_NO_WAKE_IRQ. qcom-pdc has a check for this, but irq-qcom-mpm is currently missing the check. This is causing crashes when setting up interrupts for non-wake GPIOs: root@rb1:~# gpiomon -c gpiochip1 10 irq: IRQ159: trimming hierarchy from :soc@0:interrupt-controller@f200000-1 Unable to handle kernel paging request at virtual address ffff8000a1dc3820 Hardware name: Qualcomm Technologies, Inc. Robotics RB1 (DT) pc : mpm_set_type+0x80/0xcc lr : mpm_set_type+0x5c/0xcc Call trace: mpm_set_type+0x80/0xcc (P) qcom_mpm_set_type+0x64/0x158 irq_chip_set_type_parent+0x20/0x38 msm_gpio_irq_set_type+0x50/0x530 __irq_set_trigger+0x60/0x184 __setup_irq+0x304/0x6bc request_threaded_irq+0xc8/0x19c edge_detector_setup+0x260/0x364 linereq_create+0x420/0x5a8 gpio_ioctl+0x2d4/0x6c0 Fix this by copying the check for GPIO_NO_WAKE_IRQ from qcom-pdc.c, so that MPM is removed entirely from the hierarchy for non-wake GPIOs.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 20, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
a6199bb514d8a63f61c2a22c1f912376e14d0fb2 < 45aced97f01d5ab14c8a2a60f6748f18c501c3f5 a6199bb514d8a63f61c2a22c1f912376e14d0fb2 < dfbaecf7e38f5e9bfa5e47a1e525ffbb58bab8cf a6199bb514d8a63f61c2a22c1f912376e14d0fb2 < f102342360950b56959e5fff4a874ea88ae13758 a6199bb514d8a63f61c2a22c1f912376e14d0fb2 < d5c10448f411a925dd59005785cb971f0626e032 a6199bb514d8a63f61c2a22c1f912376e14d0fb2 < 38a05c0b87833f5b188ae43b428b1f792df2b384
Linux / Linux
5.18

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/45aced97f01d5ab14c8a2a60f6748f18c501c3f5 git.kernel.org: https://git.kernel.org/stable/c/dfbaecf7e38f5e9bfa5e47a1e525ffbb58bab8cf git.kernel.org: https://git.kernel.org/stable/c/f102342360950b56959e5fff4a874ea88ae13758 git.kernel.org: https://git.kernel.org/stable/c/d5c10448f411a925dd59005785cb971f0626e032 git.kernel.org: https://git.kernel.org/stable/c/38a05c0b87833f5b188ae43b428b1f792df2b384 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html