Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp549273pxy; Wed, 21 Apr 2021 09:03:55 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz1efIQG1Ipc0Lri3t2ZLMfzExcpc9nU1R2J2h1wiLSlr12vfO3kHnvS9qX6hsYcvKqHwmF X-Received: by 2002:a17:902:527:b029:ea:b5ef:689d with SMTP id 36-20020a1709020527b02900eab5ef689dmr34782124plf.19.1619021035631; Wed, 21 Apr 2021 09:03:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619021035; cv=none; d=google.com; s=arc-20160816; b=blKBUy38xe1t8KKhPktrav40cTq9dQFsSC4l6YNGWWuxnuLn5LJ347Vy0jN597szUt FFl1VnIPdnnly8mw1JGHlxPE39Z021g5BuPblx2KUCBkHEWuJ1HdzSKF+BIP87QcPCVw ZdHJanp8Vd1x2uI5sOYtskSF1t3cSmcEo6s38cASQJEwJ1t/4rsjzLPSxnJ4/5eXqm/N 3OZbUE4BF5qZ14LKeNKc7DFFSlnQTw8l6D/84gkXX2YP2cRwVzZXzMKQ7yvjeoDN+PrI QYNJX5cyndkJph77lAa1p2yMcE/YQrkeu04AG/v9iQpQe35Ynkqq/PtwqVcuswUw+ldi MTDA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=fca3UtmvrYqx2Rc1ESXPCD2wN6Fwbvr8x5FB5cS2XjY=; b=krPVZVxZ+EO4Tk3791fNeiUbO7lcl3mkyUJ6gg2uAk1T+GK8XHvMEAI2/mSnJY+8U6 NRgJaKp6nxjIKYMtE4ffbH27HKoUQlIHS41RxJn52lNTxlUDxZCigjHJpJgKbw8jKJQ6 U3iNwkWX3IfdgWnmfsedKLFKpHc36trib/tZ7NY5RRKRnNB1xm8EGRzqutBSvv1W6hL4 Gd90zIUMfzSE+vaunSdowK9CWOtP0fSfiewj0MsBQSggOCQWDscZGonHCf6LKNusWgPY nFVEfRZNAEH8sPxnvezyFS3jXSWxzIwE1W7rx1JWHBEkXbIcmOb9sv2i4GCKV2lEh5E4 /Hzg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=GcyWxQeh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f3si2546932pfj.120.2021.04.21.09.03.43; Wed, 21 Apr 2021 09:03:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=GcyWxQeh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235523AbhDUNJD (ORCPT + 99 others); Wed, 21 Apr 2021 09:09:03 -0400 Received: from mail.kernel.org ([198.145.29.99]:48104 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241016AbhDUNGd (ORCPT ); Wed, 21 Apr 2021 09:06:33 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 7CB7A61454; Wed, 21 Apr 2021 13:05:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010359; bh=m+3ucLzlwy3goGwBfxWuBS1Xb3CtERzjhfWjyiMGLsM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=GcyWxQehf0U2srDehXY7o1z7zL25ur5nFZOYSGrhwYXHY6wXKTDChGAj07uKVeuMb +X7QGjUQDJFwiQNF/cjkE7ic8Uouw11oTAw5gdZgCmCCHpHqLlyvK4VaIfw0mraSxT GNybhK74mEU8hv25tWdDuojPvI204R1UZZMxUDto= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Aditya Pakki , "David S . Miller" Subject: [PATCH 072/190] Revert "net: atm: Reduce the severity of logging in unlink_clip_vcc" Date: Wed, 21 Apr 2021 14:59:07 +0200 Message-Id: <20210421130105.1226686-73-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit 60f5c4aaae452ae9252128ef7f9ae222aa70c569. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Aditya Pakki Cc: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/atm/clip.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/net/atm/clip.c b/net/atm/clip.c index 294cb9efe3d3..a7972da7235d 100644 --- a/net/atm/clip.c +++ b/net/atm/clip.c @@ -89,7 +89,7 @@ static void unlink_clip_vcc(struct clip_vcc *clip_vcc) struct clip_vcc **walk; if (!entry) { - pr_err("!clip_vcc->entry (clip_vcc %p)\n", clip_vcc); + pr_crit("!clip_vcc->entry (clip_vcc %p)\n", clip_vcc); return; } netif_tx_lock_bh(entry->neigh->dev); /* block clip_start_xmit() */ @@ -109,10 +109,10 @@ static void unlink_clip_vcc(struct clip_vcc *clip_vcc) error = neigh_update(entry->neigh, NULL, NUD_NONE, NEIGH_UPDATE_F_ADMIN, 0); if (error) - pr_err("neigh_update failed with %d\n", error); + pr_crit("neigh_update failed with %d\n", error); goto out; } - pr_err("ATMARP: failed (entry %p, vcc 0x%p)\n", entry, clip_vcc); + pr_crit("ATMARP: failed (entry %p, vcc 0x%p)\n", entry, clip_vcc); out: netif_tx_unlock_bh(entry->neigh->dev); } -- 2.31.1