In the Linux kernel, the following vulnerability has been resolved:
PM / devfreq: rk3399_dmc: Disable edev on remove()
Otherwise we hit an unablanced enable-count when unbinding the DFI device:
[ 1279.659119] ------------[ cut here ]------------ [ 1279.659179] WARNING: CPU: 2 PID: 5638 at drivers/devfreq/devfreq-event.c:360 devfreqeventremoveedev+0x84/0x8c ... [ 1279.659352] Hardware name: Google Kevin (DT) [ 1279.659363] pstate: 80400005 (Nzcv daif +PAN -UAO -TCO BTYPE=--) [ 1279.659371] pc : devfreqeventremoveedev+0x84/0x8c [ 1279.659380] lr : devmdevfreqeventrelease+0x1c/0x28 ... [ 1279.659571] Call trace: [ 1279.659582] devfreqeventremoveedev+0x84/0x8c [ 1279.659590] devmdevfreqeventrelease+0x1c/0x28 [ 1279.659602] releasenodes+0x1cc/0x244 [ 1279.659611] devresreleaseall+0x44/0x60 [ 1279.659621] devicereleasedriverinternal+0x11c/0x1ac [ 1279.659629] devicedriverdetach+0x20/0x2c [ 1279.659641] unbindstore+0x7c/0xb0 [ 1279.659650] drvattrstore+0x2c/0x40 [ 1279.659663] sysfskfwrite+0x44/0x58 [ 1279.659672] kernfsfopwriteiter+0xf4/0x190 [ 1279.659684] vfswrite+0x2b0/0x2e4 [ 1279.659693] ksyswrite+0x80/0xec [ 1279.659701] _arm64syswrite+0x24/0x30 [ 1279.659714] el0svccommon+0xf0/0x1d8 [ 1279.659724] doel0svccompat+0x28/0x3c [ 1279.659738] el0svccompat+0x10/0x1c [ 1279.659746] el0synccompathandler+0xa8/0xcc [ 1279.659758] el0synccompat+0x188/0x1c0 [ 1279.659768] ---[ end trace cec200e5094155b4 ]---