Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp511843pxy; Wed, 21 Apr 2021 08:14:16 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx0PXt2Ea8TL3Ix694eRCe/OapBsM0nZKdUOjkdI2KG7os7WsZiNAIlM6vQG0mBHB9iTeZn X-Received: by 2002:a62:8784:0:b029:259:1d11:f145 with SMTP id i126-20020a6287840000b02902591d11f145mr27688995pfe.79.1619018056509; Wed, 21 Apr 2021 08:14:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619018056; cv=none; d=google.com; s=arc-20160816; b=Don6GtwE3HYWlsCSBSiIS/o6PrVxJ9Th9xpoNh0Cl1RzpkQ64LnGU48a3sig6R/DED Bj1L5ygre1JzCnTXwg7C2oR5Uz9YJXfZyYviWQ0xlysT5eCobi39S6SvEInxk9Jj8qWj 3c3BYNsA5pxUseikaHp4b+9HKVKrCaIRhfYQho5liXCN6GURwNNoYZIKLXbd78EX205q ++8oobqeFGGlrt//mSml6MaRaiH8ug0D+Bf0J+y+6yPeFvAvLlO90HEmAJBet0fqMskJ 8zXmT55tJ/SifoUUsqfHBp0JMon+KWjHkIGSGXifytrXt+YNUHhdT/Nda7FokEwwN8et 9xug== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=G+1eIhJxf8J0P++RNdv5aYBv+L8MOof25SteGqKgbqM=; b=Ng7ViuTvLYyNf0F4lXaILycObRHh492J9a5kyXB5pGcwE/NbAaJYxzI6ezzAGEbcfN CdBudMc7WufjXh9dgCLOBgx9Yb4guF9cb6tWYMj+OKEfSxdGVFzNZ3mXB58mIUGa6ncZ RgevXeXqphalhSGkOBNkeQnh/t0MTN6nd5QPafN05r3W1MV4JPYKJyIlJ/0FwEaZSP81 iNMxq1XyOJjDugmKfhuG1bFG2Ma2cn8VTihJe4UxRgNE79K/o1wvqtKYue2kwrkEiln5 /lA2dFOt1eTQdthV4YyEdXxC28vJyzKrWx7N+uFrmXs9736spF/JiEYFIfZ6qCz4X6AW zbKw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=PhVEBRel; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c140si2675987pfc.135.2021.04.21.08.14.03; Wed, 21 Apr 2021 08:14:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=PhVEBRel; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235131AbhDUNFV (ORCPT + 99 others); Wed, 21 Apr 2021 09:05:21 -0400 Received: from mail.kernel.org ([198.145.29.99]:44788 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240601AbhDUNE0 (ORCPT ); Wed, 21 Apr 2021 09:04:26 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id ED1706144C; Wed, 21 Apr 2021 13:03:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010232; bh=l233XCfRG/lEpEy02xGiO26Ehmuwm0jg3tAhArijFOo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=PhVEBRelCG7mrZBHFt23qJrUaPQlmMTZYgwsRkM3q7svZ683B1qHQUifZMHP6B5pB ihZAGj+T5pM7t3G2B1Gxb0XQAd6jrzC0pMJehH2/BB7oU0a7lkSINXX7wTyOpp55uq tlJTg+MgAAMqMNp+vnYeIS4RfJneh3Aqi8Wim6fU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Aditya Pakki , Bart Van Assche , Jason Gunthorpe Subject: [PATCH 059/190] Revert "RDMA/srpt: Remove unnecessary assertion in srpt_queue_response" Date: Wed, 21 Apr 2021 14:58:54 +0200 Message-Id: <20210421130105.1226686-60-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit 9f48db0d4a08624bb9ba847ea40c8abad753b396. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: https Cc: Aditya Pakki Cc: Bart Van Assche Cc: Jason Gunthorpe Cc: Jason Gunthorpe Signed-off-by: Greg Kroah-Hartman --- drivers/infiniband/ulp/srpt/ib_srpt.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/drivers/infiniband/ulp/srpt/ib_srpt.c b/drivers/infiniband/ulp/srpt/ib_srpt.c index 6be60aa5ffe2..b5a7c4fbf23b 100644 --- a/drivers/infiniband/ulp/srpt/ib_srpt.c +++ b/drivers/infiniband/ulp/srpt/ib_srpt.c @@ -2807,6 +2807,8 @@ static void srpt_queue_response(struct se_cmd *cmd) int resp_len, ret, i; u8 srp_tm_status; + BUG_ON(!ch); + state = ioctx->state; switch (state) { case SRPT_STATE_NEW: -- 2.31.1