{"id":"CVE-2025-71180","summary":"counter: interrupt-cnt: Drop IRQF_NO_THREAD flag","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ncounter: interrupt-cnt: Drop IRQF_NO_THREAD flag\n\nAn IRQ handler can either be IRQF_NO_THREAD or acquire spinlock_t, as\nCONFIG_PROVE_RAW_LOCK_NESTING warns:\n=============================\n[ BUG: Invalid wait context ]\n6.18.0-rc1+git... #1\n-----------------------------\nsome-user-space-process/1251 is trying to lock:\n(&counter-\u003eevents_list_lock){....}-{3:3}, at: counter_push_event [counter]\nother info that might help us debug this:\ncontext-{2:2}\nno locks held by some-user-space-process/....\nstack backtrace:\nCPU: 0 UID: 0 PID: 1251 Comm: some-user-space-process 6.18.0-rc1+git... #1 PREEMPT\nCall trace:\n show_stack (C)\n dump_stack_lvl\n dump_stack\n __lock_acquire\n lock_acquire\n _raw_spin_lock_irqsave\n counter_push_event [counter]\n interrupt_cnt_isr [interrupt_cnt]\n __handle_irq_event_percpu\n handle_irq_event\n handle_simple_irq\n handle_irq_desc\n generic_handle_domain_irq\n gpio_irq_handler\n handle_irq_desc\n generic_handle_domain_irq\n gic_handle_irq\n call_on_irq_stack\n do_interrupt_handler\n el0_interrupt\n __el0_irq_handler_common\n el0t_64_irq_handler\n el0t_64_irq\n\n... and Sebastian correctly points out. Remove IRQF_NO_THREAD as an\nalternative to switching to raw_spinlock_t, because the latter would limit\nall potential nested locks to raw_spinlock_t only.","modified":"2026-04-02T13:04:55.155677Z","published":"2026-01-31T11:38:52.481Z","database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71180.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1c5a3175aecf82cd86dfcbef2a23e8b26d8d8e7c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/23f9485510c338476b9735d516c1d4aacb810d46"},{"type":"WEB","url":"https://git.kernel.org/stable/c/425886b1f8304621b3f16632b274357067d5f13f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/49a66829dd3653695e60d7cae13521d131362fcd"},{"type":"WEB","url":"https://git.kernel.org/stable/c/51d2e5d6491447258cb39ff1deb93df15d3c23cb"},{"type":"WEB","url":"https://git.kernel.org/stable/c/ef668c9a2261ec9287faba6e6ef05a98b391aa2b"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/71xxx/CVE-2025-71180.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-71180"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"a55ebd47f21f6f0472766fb52c973849e31d1466"},{"fixed":"ef668c9a2261ec9287faba6e6ef05a98b391aa2b"},{"fixed":"51d2e5d6491447258cb39ff1deb93df15d3c23cb"},{"fixed":"1c5a3175aecf82cd86dfcbef2a23e8b26d8d8e7c"},{"fixed":"49a66829dd3653695e60d7cae13521d131362fcd"},{"fixed":"425886b1f8304621b3f16632b274357067d5f13f"},{"fixed":"23f9485510c338476b9735d516c1d4aacb810d46"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-71180.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.13.0"},{"fixed":"5.15.198"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.161"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.121"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.66"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.18.6"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-71180.json"}}],"schema_version":"1.7.5"}