In the Linux kernel, the following vulnerability has been resolved:
wifi: wilc1000: add missing unregister netdev() in wilc netdev ifc init()
Fault injection test reports this issue:
kernel BUG at net/core/dev.c:10731!
invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI
Call Trace:
<TASK>
wilc netdev ifc init+0x19f/0x220 [wilc1000 884bf126e9e98af6a708f266a8dffd53f99e4bf5]
wilc cfg80211 init+0x30c/0x380 [wilc1000 884bf126e9e98af6a708f266a8dffd53f99e4bf5]
wilc bus probe+0xad/0x2b0 [wilc1000 spi 1520a7539b6589cc6cde2ae826a523a33f8bacff]
spi probe+0xe4/0x140
really probe+0x17e/0x3f0
driver probe device+0xe3/0x170
driver probe device+0x49/0x120
The root case here is alloc ordered workqueue() fails, but
cfg80211 unregister netdevice() or unregister netdev() not be called in
error handling path. To fix add unregister netdev goto lable to add the
unregister operation in error handling path.