In the Linux kernel, the following vulnerability has been resolved:
staticcall: Replace pointless WARNON() in staticcallmodule_notify()
staticcallmodulenotify() triggers a WARNON(), when memory allocation fails in _staticcalladdmodule().
That's not really justified, because the failure case must be correctly handled by the well known call chain and the error code is passed through to the initiating userspace application.
A memory allocation fail is not a fatal problem, but the WARNON() takes the machine out when panicon_warn is set.
Replace it with a pr_warn().