CVE-2026-31687 PUBLISHED

gpio: omap: do not register driver in probe()

Assigner: Linux
Reserved: 09.03.2026 Published: 27.04.2026 Updated: 27.04.2026

In the Linux kernel, the following vulnerability has been resolved:

gpio: omap: do not register driver in probe()

Commit 11a78b794496 ("ARM: OMAP: MPUIO wake updates") registers the omap_mpuio_driver from omap_mpuio_init(), which is called from omap_gpio_probe().

However, it neither makes sense to register drivers from probe() callbacks of other drivers, nor does the driver core allow registering drivers with a device lock already being held.

The latter was revealed by commit dc23806a7c47 ("driver core: enforce device_lock for driver_match_device()") leading to a potential deadlock condition described in [1].

Additionally, the omap_mpuio_driver is never unregistered from the driver core, even if the module is unloaded.

Hence, register the omap_mpuio_driver from the module initcall and unregister it in module_exit().

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from 11a78b7944963a8b052be46108d07a3ced9e2762 to 57bcd3feffa79544c73a1a1872472389a391cc79 (excl.)
  • affected from 11a78b7944963a8b052be46108d07a3ced9e2762 to 86588916e1887a5edb8a9161cd7ae81e47a7ed25 (excl.)
  • affected from 11a78b7944963a8b052be46108d07a3ced9e2762 to a29215961d833f4de33a09c3964d31ebc6083033 (excl.)
  • affected from 11a78b7944963a8b052be46108d07a3ced9e2762 to 1c04c3a4de8d4bcb9202f94c44f26c57c2572308 (excl.)
  • affected from adc1796eced46b48e23ec200a219d635f33a38ee to 673dafb9a86349a12a93151fd467625614dc7e12 (excl.)
  • affected from 11a78b7944963a8b052be46108d07a3ced9e2762 to 2211d77892913804d16c28c7415b82804ab1e54c (excl.)
  • affected from cd0e0a76e40c2e77bcfc88291d00dca22b00158e to a7fa9460b86f810913b6779461d0448e7c11214c (excl.)
  • affected from 11a78b7944963a8b052be46108d07a3ced9e2762 to 32f08c3ddd6dda6cbb6c9d715de10f21dccde50f (excl.)
  • affected from 8d76b2488eb3cc0717ab81b60622cff4a5f90f79 to 53a76425e0764421ba93bb9045d2e454667d5687 (excl.)
  • affected from 11a78b7944963a8b052be46108d07a3ced9e2762 to 730e5ebff40c852e3ea57b71bf02a4b89c69435f (excl.)
  • affected from bc82e5f4d7dc8237ae8cabc73aa46fc93c85d98c to 03db4dc9ad6eb91e640b517e00373ce877682854 (excl.)
Vendor Linux
Product Linux
Versions Default: affected
  • Version 2.6.22 is affected
  • unaffected from 0 to 2.6.22 (excl.)
  • unaffected from 5.10.251 to 5.10.* (incl.)
  • unaffected from 5.15.201 to 5.15.* (incl.)
  • unaffected from 6.1.164 to 6.1.* (incl.)
  • unaffected from 6.6.125 to 6.6.* (incl.)
  • unaffected from 6.6.126 to 6.6.* (incl.)
  • unaffected from 6.12.72 to 6.12.* (incl.)
  • unaffected from 6.12.73 to 6.12.* (incl.)
  • unaffected from 6.18.11 to 6.18.* (incl.)
  • unaffected from 6.18.12 to 6.18.* (incl.)
  • unaffected from 6.19.2 to 6.19.* (incl.)
  • unaffected from 6.19 to * (incl.)

References