In the Linux kernel, the following vulnerability has been resolved:
slimbus: qcom-ngd: cleanup in probe error path
Add proper error path in probe() to cleanup resources previously acquired/allocated to fix warnings visible during probe deferral:
notifier callback qcomslimngdssrnotify already registered WARNING: CPU: 6 PID: 70 at kernel/notifier.c:28 notifierchainregister+0x5c/0x90 Modules linked in: CPU: 6 PID: 70 Comm: kworker/u16:1 Not tainted 6.0.0-rc3-next-20220830 #380 Call trace: notifierchainregister+0x5c/0x90 srcunotifierchainregister+0x44/0x90 qcomregisterssrnotifier+0x38/0x4c qcomslimngdctrlprobe+0xd8/0x400 platformprobe+0x6c/0xe0 reallyprobe+0xbc/0x2d4 _driverprobedevice+0x78/0xe0 driverprobedevice+0x3c/0x12c _deviceattachdriver+0xb8/0x120 busforeachdrv+0x78/0xd0 _deviceattach+0xa8/0x1c0 deviceinitialprobe+0x18/0x24 busprobedevice+0xa0/0xac deferredprobeworkfunc+0x88/0xc0 processonework+0x1d4/0x320 workerthread+0x2cc/0x44c kthread+0x110/0x114 retfrom_fork+0x10/0x20