Received: by 10.192.165.148 with SMTP id m20csp4197856imm; Mon, 30 Apr 2018 13:40:36 -0700 (PDT) X-Google-Smtp-Source: AB8JxZrvpG4lI30IR7ehDKs4Z+NSPgUJDzWgEuzvU9fu88mKwAbWFQTlJKdIjpwtSFA3PSkzJnFK X-Received: by 2002:a17:902:ab86:: with SMTP id f6-v6mr13231293plr.185.1525120836601; Mon, 30 Apr 2018 13:40:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525120836; cv=none; d=google.com; s=arc-20160816; b=yhb7vnoFucu4vOeh1KLyRHRPLeAUMy7r5/TWxoiVjuurFVsgvWaILSQsjpB4yDsl76 dDt8urtcgrVYJV5gKkLXEZVXI9y3USfChqq4/f2OIudFT2w1N93t17PptI6HLrVgLXhe BOH9n3Uj5nN2pFsSWZv1LVr6g1tUVgtOgk2dMxSqeJo3Aluj2vsOfvDz7jA5uJyyoJzU rUhFVAFqaY3n2yg9HpiVlNUjHPKtOMmQtBm9c+k6GT5dvRp5WVp/zoJZOcdLUsU5HQdC IBRpkzxulXyH9Aor+1Njh7TNigJEESGO5OGNb3f0q/z8GxO59hNE1h3PphXlMM32s7zc iJdw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from:dmarc-filter :arc-authentication-results; bh=txPEvKYGBDlXMqTs/VG/d5Lzvw6tFEfA+M76a0oGsBg=; b=xpI0vBoGR8uXuzGQNkjO3pfrLgnMfuXG92yX/eyzjcDSz1LvLWqwXnmSyy7Mj/PiIS ki3jhJAaztSz8DF58fadpdSXi6PwabUll4z6EBBZJmgQM/iIcOEIOjo1+Y7WIbpFqqTT vhiwwKTxQtkySACqfBhLTDgCupL/CC1W4rsXprYOKvHXsqPBxWYqRXwYNyXs2HVrVUat pJ6m1lZtabdrbqaC+Dx/pd8r20uZ2rxn9bn1GHQ1sEB3Mg8VS4jzK3HlX/AxP84w3Og5 Ami86EHdkjVTSgz/DHHHmM6zmZ7ouqM8YaHvQEzMh02Y/44inqtQVnOETcelVd7g1uvj p4hA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o11-v6si6688102pgf.542.2018.04.30.13.40.22; Mon, 30 Apr 2018 13:40:36 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755201AbeD3TYD (ORCPT + 99 others); Mon, 30 Apr 2018 15:24:03 -0400 Received: from mail.kernel.org ([198.145.29.99]:57570 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755061AbeD3TX7 (ORCPT ); Mon, 30 Apr 2018 15:23:59 -0400 Received: from localhost (unknown [104.132.1.102]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B042A22DBE; Mon, 30 Apr 2018 19:23:58 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org B042A22DBE Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=linuxfoundation.org Authentication-Results: mail.kernel.org; spf=fail smtp.mailfrom=gregkh@linuxfoundation.org From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dmitry Vyukov , syzbot+209c0f67f99fec8eb14b@syzkaller.appspotmail.com, syzbot+7fb6d9525a4528104e05@syzkaller.appspotmail.com, syzbot+2e63711063e2d8f9ea27@syzkaller.appspotmail.com, syzbot+de73361ee4971b6e6f75@syzkaller.appspotmail.com Subject: [PATCH 3.18 21/25] kobject: dont use WARN for registration failures Date: Mon, 30 Apr 2018 12:23:28 -0700 Message-Id: <20180430183911.685047353@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180430183910.801976983@linuxfoundation.org> References: <20180430183910.801976983@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 3.18-stable review patch. If anyone has any objections, please let me know. ------------------ From: Dmitry Vyukov commit 3e14c6abbfb5c94506edda9d8e2c145d79375798 upstream. This WARNING proved to be noisy. The function still returns an error and callers should handle it. That's how most of kernel code works. Downgrade the WARNING to pr_err() and leave WARNINGs for kernel bugs. Signed-off-by: Dmitry Vyukov Reported-by: syzbot+209c0f67f99fec8eb14b@syzkaller.appspotmail.com Reported-by: syzbot+7fb6d9525a4528104e05@syzkaller.appspotmail.com Reported-by: syzbot+2e63711063e2d8f9ea27@syzkaller.appspotmail.com Reported-by: syzbot+de73361ee4971b6e6f75@syzkaller.appspotmail.com Cc: stable Signed-off-by: Greg Kroah-Hartman --- lib/kobject.c | 12 +++++------- 1 file changed, 5 insertions(+), 7 deletions(-) --- a/lib/kobject.c +++ b/lib/kobject.c @@ -234,14 +234,12 @@ static int kobject_add_internal(struct k /* be noisy on error issues */ if (error == -EEXIST) - WARN(1, "%s failed for %s with " - "-EEXIST, don't try to register things with " - "the same name in the same directory.\n", - __func__, kobject_name(kobj)); + pr_err("%s failed for %s with -EEXIST, don't try to register things with the same name in the same directory.\n", + __func__, kobject_name(kobj)); else - WARN(1, "%s failed for %s (error: %d parent: %s)\n", - __func__, kobject_name(kobj), error, - parent ? kobject_name(parent) : "'none'"); + pr_err("%s failed for %s (error: %d parent: %s)\n", + __func__, kobject_name(kobj), error, + parent ? kobject_name(parent) : "'none'"); } else kobj->state_in_sysfs = 1;