{"id":"CVE-2022-50319","summary":"coresight: trbe: remove cpuhp instance node before remove cpuhp state","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ncoresight: trbe: remove cpuhp instance node before remove cpuhp state\n\ncpuhp_state_add_instance() and cpuhp_state_remove_instance() should\nbe used in pairs. Or there will lead to the warn on\ncpuhp_remove_multi_state() since the cpuhp_step list is not empty.\n\nThe following is the error log with 'rmmod coresight-trbe':\nError: Removing state 215 which has instances left.\nCall trace:\n  __cpuhp_remove_state_cpuslocked+0x144/0x160\n  __cpuhp_remove_state+0xac/0x100\n  arm_trbe_device_remove+0x2c/0x60 [coresight_trbe]\n  platform_remove+0x34/0x70\n  device_remove+0x54/0x90\n  device_release_driver_internal+0x1e4/0x250\n  driver_detach+0x5c/0xb0\n  bus_remove_driver+0x64/0xc0\n  driver_unregister+0x3c/0x70\n  platform_driver_unregister+0x20/0x30\n  arm_trbe_exit+0x1c/0x658 [coresight_trbe]\n  __arm64_sys_delete_module+0x1ac/0x24c\n  invoke_syscall+0x50/0x120\n  el0_svc_common.constprop.0+0x58/0x1a0\n  do_el0_svc+0x38/0xd0\n  el0_svc+0x2c/0xc0\n  el0t_64_sync_handler+0x1ac/0x1b0\n  el0t_64_sync+0x19c/0x1a0\n ---[ end trace 0000000000000000 ]---","modified":"2026-05-07T04:17:36.285895Z","published":"2025-09-15T14:48:52.017Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50319.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/18b9202188a4e59923834c60b5c82ea1da7d1811"},{"type":"WEB","url":"https://git.kernel.org/stable/c/20ee8c223f792947378196307d8e707c9cdc2d61"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2ea334960afcd49385840c7afd59fc5f8d3ce682"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3c18888bc0b51835c74123b1e04d5df11543724c"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/50xxx/CVE-2022-50319.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-50319"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"3fbf7f011f2426dac8c982f1d2ef469a7959a524"},{"fixed":"18b9202188a4e59923834c60b5c82ea1da7d1811"},{"fixed":"2ea334960afcd49385840c7afd59fc5f8d3ce682"},{"fixed":"3c18888bc0b51835c74123b1e04d5df11543724c"},{"fixed":"20ee8c223f792947378196307d8e707c9cdc2d61"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50319.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.13.0"},{"fixed":"5.15.86"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.0.16"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.1.0"},{"fixed":"6.1.2"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-50319.json"}}],"schema_version":"1.7.5"}