From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Google-Smtp-Source: AH8x224Vq/vMkARVgAjAG8mNXSW4KdlZzI6d4ObAU7CvE16QFIQHQzkwqohYFvhLG2MbzWkzDDkU ARC-Seal: i=1; a=rsa-sha256; t=1517256506; cv=none; d=google.com; s=arc-20160816; b=nNpf4OkM9tOyPdCi785wC6F+qhQ6eZMCJJpqBzfRHs3epmrRe4RVTCMTorU78v+L8u gfHxPm52U19ot+owgh2F9WYqD5rp4N31HKlMXZnlMZlpAUjJTOUf65uyPz4YB9wPt00S 2me/+0Mmmz1/HbNnL4lclAzZ+C7SvMmRv9d7z4ero3TL6Nn/25EEp684wlfWC5zxvd+U BdKvk2R/+PxsEWGqftD3OS8QFE4mm/boeali4m6r2FzBUjf3GlFfqTXA4JBWkUds5BKp BKF0+2FqyRn/XZPsRMsw/tKV4LGsi720QbA9ncksi97wQB5bYaYNeTurV2vmEDX30guh 4UYw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=mime-version:user-agent:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=+0jFuztLBMEaCl0tx97cTq9tLUee5lE4dVlUDNuXTOE=; b=zD0+3k8XKPavGbsSn/Gc4oiUQwnohw6QMuRitKep29tLwf5+XIeT7Cqo+4X8zun17A bwQrS6eA/Mm2+z4p2XYHGTls6GVb9m7if9mnOH22+ZipFgncbsKFh3WXV4FkiDbE1lZW 2TR1nd3Vhhq8GOj/XlaKK2zHUigMYwQBi5CssPJnmTo00xzRVg9t96xVbuZYZp9BrkLR JalZ0NI11E0x0wOJ26WlsXuADM8VpEydM2H2Uxo7uQMLbOiJKgRol3nKaz/kObOiYvnV 67d/I1Yz2ffiG0A84x486TEsmHON+hfiiMJzpn/dKso/WqfYBtYUHGbLhktvlopLLkD2 MgOQ== ARC-Authentication-Results: i=1; mx.google.com; spf=softfail (google.com: domain of transitioning gregkh@linuxfoundation.org does not designate 90.92.71.90 as permitted sender) smtp.mailfrom=gregkh@linuxfoundation.org Authentication-Results: mx.google.com; spf=softfail (google.com: domain of transitioning gregkh@linuxfoundation.org does not designate 90.92.71.90 as permitted sender) smtp.mailfrom=gregkh@linuxfoundation.org From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, syzbot+4386709c0c1284dca827@syzkaller.appspotmail.com, Dmitry Vyukov , Oliver Hartkopp , Marc Kleine-Budde Subject: [PATCH 4.9 07/66] can: af_can: can_rcv(): replace WARN_ONCE by pr_warn_once Date: Mon, 29 Jan 2018 13:56:31 +0100 Message-Id: <20180129123840.217620076@linuxfoundation.org> X-Mailer: git-send-email 2.16.1 In-Reply-To: <20180129123839.842860149@linuxfoundation.org> References: <20180129123839.842860149@linuxfoundation.org> User-Agent: quilt/0.65 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-LABELS: =?utf-8?b?IlxcU2VudCI=?= X-GMAIL-THRID: =?utf-8?q?1590958495106589176?= X-GMAIL-MSGID: =?utf-8?q?1590958758224244487?= X-Mailing-List: linux-kernel@vger.kernel.org List-ID: 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Marc Kleine-Budde commit 8cb68751c115d176ec851ca56ecfbb411568c9e8 upstream. If an invalid CAN frame is received, from a driver or from a tun interface, a Kernel warning is generated. This patch replaces the WARN_ONCE by a simple pr_warn_once, so that a kernel, bootet with panic_on_warn, does not panic. A printk seems to be more appropriate here. Reported-by: syzbot+4386709c0c1284dca827@syzkaller.appspotmail.com Suggested-by: Dmitry Vyukov Acked-by: Oliver Hartkopp Signed-off-by: Marc Kleine-Budde Signed-off-by: Oliver Hartkopp Signed-off-by: Greg Kroah-Hartman --- net/can/af_can.c | 11 +++++------ 1 file changed, 5 insertions(+), 6 deletions(-) --- a/net/can/af_can.c +++ b/net/can/af_can.c @@ -722,13 +722,12 @@ static int can_rcv(struct sk_buff *skb, if (unlikely(!net_eq(dev_net(dev), &init_net))) goto drop; - if (WARN_ONCE(dev->type != ARPHRD_CAN || - skb->len != CAN_MTU || - cfd->len > CAN_MAX_DLEN, - "PF_CAN: dropped non conform CAN skbuf: " - "dev type %d, len %d, datalen %d\n", - dev->type, skb->len, cfd->len)) + if (unlikely(dev->type != ARPHRD_CAN || skb->len != CAN_MTU || + cfd->len > CAN_MAX_DLEN)) { + pr_warn_once("PF_CAN: dropped non conform CAN skbuf: dev type %d, len %d, datalen %d\n", + dev->type, skb->len, cfd->len); goto drop; + } can_receive(skb, dev); return NET_RX_SUCCESS;