Deadlock & Unregistered Driver in omap_mpuio (Linux kernel)
CVE-2026-31687 Published on April 27, 2026
gpio: omap: do not register driver in probe()
In the Linux kernel, the following vulnerability has been resolved:
gpio: omap: do not register driver in probe()
Commit 11a78b794496 ("ARM: OMAP: MPUIO wake updates") registers the
omap_mpuio_driver from omap_mpuio_init(), which is called from
omap_gpio_probe().
However, it neither makes sense to register drivers from probe()
callbacks of other drivers, nor does the driver core allow registering
drivers with a device lock already being held.
The latter was revealed by commit dc23806a7c47 ("driver core: enforce
device_lock for driver_match_device()") leading to a potential deadlock
condition described in [1].
Additionally, the omap_mpuio_driver is never unregistered from the
driver core, even if the module is unloaded.
Hence, register the omap_mpuio_driver from the module initcall and
unregister it in module_exit().
Products Associated with CVE-2026-31687
Want to know whenever a new CVE is published for Linux Kernel? stack.watch will email you.
Affected Versions
Linux:- Version 11a78b7944963a8b052be46108d07a3ced9e2762 and below 57bcd3feffa79544c73a1a1872472389a391cc79 is affected.
- Version 11a78b7944963a8b052be46108d07a3ced9e2762 and below 86588916e1887a5edb8a9161cd7ae81e47a7ed25 is affected.
- Version 11a78b7944963a8b052be46108d07a3ced9e2762 and below a29215961d833f4de33a09c3964d31ebc6083033 is affected.
- Version 11a78b7944963a8b052be46108d07a3ced9e2762 and below 1c04c3a4de8d4bcb9202f94c44f26c57c2572308 is affected.
- Version adc1796eced46b48e23ec200a219d635f33a38ee and below 673dafb9a86349a12a93151fd467625614dc7e12 is affected.
- Version 11a78b7944963a8b052be46108d07a3ced9e2762 and below 2211d77892913804d16c28c7415b82804ab1e54c is affected.
- Version cd0e0a76e40c2e77bcfc88291d00dca22b00158e and below a7fa9460b86f810913b6779461d0448e7c11214c is affected.
- Version 11a78b7944963a8b052be46108d07a3ced9e2762 and below 32f08c3ddd6dda6cbb6c9d715de10f21dccde50f is affected.
- Version 8d76b2488eb3cc0717ab81b60622cff4a5f90f79 and below 53a76425e0764421ba93bb9045d2e454667d5687 is affected.
- Version 11a78b7944963a8b052be46108d07a3ced9e2762 and below 730e5ebff40c852e3ea57b71bf02a4b89c69435f is affected.
- Version bc82e5f4d7dc8237ae8cabc73aa46fc93c85d98c and below 03db4dc9ad6eb91e640b517e00373ce877682854 is affected.
- Version 2.6.22 is affected.
- Before 2.6.22 is unaffected.
- Version 5.10.251, <= 5.10.* is unaffected.
- Version 5.15.201, <= 5.15.* is unaffected.
- Version 6.1.164, <= 6.1.* is unaffected.
- Version 6.6.125, <= 6.6.* is unaffected.
- Version 6.6.126, <= 6.6.* is unaffected.
- Version 6.12.72, <= 6.12.* is unaffected.
- Version 6.12.73, <= 6.12.* is unaffected.
- Version 6.18.11, <= 6.18.* is unaffected.
- Version 6.18.12, <= 6.18.* is unaffected.
- Version 6.19.2, <= 6.19.* is unaffected.
- Version 6.19, <= * is unaffected.