In the Linux kernel, the following vulnerability has been resolved:mailbox: mtk-cmdq: Move devm_mbox_controller_register() after devm_pm_runtime_enable()When mtk-cmdq unbinds, a WARN_ON message with conditionpm_runtime_get_sync() <0occurs.Accordingtothecalltraceibelow:cmdq_mbox_shutdownmbox_free_channelmbox_controller_unregister__devm_mbox_controller_unregister...Therootcausecanbededucedtobecallingpm_runtime_get_sync()aftercallingpm_runtime_disable()asobservedbelow:1.CMDQdriverusesdevm_mbox_controller_register()incmdq_probe()tobindthecmdqdevicetothembox_controller,sodevm_mbox_controller_unregister()willautomaticallyunregisterthedeviceboundtothemailboxcontrollerwhenthedevice-managedresourceisremoved.Thatmeansdevm_mbox_controller_unregister()andcmdq_mbox_shoutdown()willbecalledaftercmdq_remove().2.CMDQdriveralsousesdevm_pm_runtime_enable()incmdq_probe()afterdevm_mbox_controller_register(),sothatdevm_pm_runtime_disable()willbecalledaftercmdq_remove(),butbeforedevm_mbox_controller_unregister().Tofixthisproblem,cmdq_probe()needstomovedevm_mbox_controller_register()afterdevm_pm_runtime_enable()tomakedevm_pm_runtime_disable()becalledafterdevm_mbox_controller_unregister().