On 11/26/20 8:21 PM, Oliver Hartkopp wrote: > To detect potential bugs in CAN protocol implementations (double removal > of receiver entries) a WARN() statement has been used if no matching list > item was found for removal. > > The fault injection issued by syzkaller was able to create a situation > where the closing of a socket runs simultaneously to the notifier call > chain for removing the CAN network device in use. > > This case is very unlikely in real life but it doesn't break anything. > Therefore we just replace the WARN() statement with pr_warn() to > preserve the notification for the CAN protocol development. > > Reported-by: syzbot+381d06e0c8eaacb8706f@syzkaller.appspotmail.com > Reported-by: syzbot+d0ddd88c9a7432f041e6@syzkaller.appspotmail.com > Reported-by: syzbot+76d62d3b8162883c7d11@syzkaller.appspotmail.com > Signed-off-by: Oliver Hartkopp applied to can/testing. tnx, Marc -- Pengutronix e.K. | Marc Kleine-Budde | Embedded Linux | https://www.pengutronix.de | Vertretung West/Dortmund | Phone: +49-231-2826-924 | Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |