Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp517752pxy; Wed, 21 Apr 2021 08:20:28 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxjYyrCLaNiVafSusBAx+qQitnW5Vf6w6wYZbUOJDPOtbV639KNLvpmlWNjkaj/pBHFER/4 X-Received: by 2002:a17:902:8bcb:b029:ec:a192:21cf with SMTP id r11-20020a1709028bcbb02900eca19221cfmr17955236plo.71.1619018428517; Wed, 21 Apr 2021 08:20:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619018428; cv=none; d=google.com; s=arc-20160816; b=wWe+VxNEbQ34SG4DqjKe2F6BpRVToUV1jPb9Aph00JbtdVUz2kEiQzDcYsglCcJy6L 8h3Fk3AuIw8kg61mxPKS7xgqxcRVN6FUeT/C1N7XlIr4qK/JTgHgc26rSGJxq3yHh45Y OI1JOgronQw9gKyQsT2U7a8qJjSEvebnyvsXiSybTkDZtRA+nMwl2K+rBlckcjlvqRMH OrqQtIROG1tPG3wdLhjFgtuIpm0hc6wiW889rM30ndjDhtfJiHQpb+e6++d9V4MWXcKG lt1Xr4z+ECcCxZumkNZigFZwEHqTSG0tXV2kZZxwKXAnGL87ezv1E6P5Oxl9yuShSo6I J8Rg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=Z6nXYmFEXxrI0+kEs/YO5JCe2xAcT3DHhxgmJU2uzVE=; b=CfTXcVHUf21al7+ElzmyeXJYssQnEItAQvs+4WZBUKtsH5Y3HoMFcHO7+esI/KLKL7 AKKhVb5qS2aRmkmrRkugmk4DOwQyJIafrlUm1J1ZlspcJ+tx28zDeoNLYyJqySVnclY4 pXYyJRxoOO3++YYRHCnxlm/qcXWMef8b7eSCq2pp5m+J5/fD4iI83pXFpmCI5L7uJwlq CHtWmDNJ9j80hV4N2sSlMZoxDSaCvGytSw5M9KOyaW55TQhCvKUzsOoT277LC1pakIWK HKw7VtlakKKnw43Ozxrrirw6iRRr4GcqH8jni6qa1L9UHxNYw5cX6CN+Nt3O9QGebBmW qEow== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Cx7foaBS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o17si3189354pjr.164.2021.04.21.08.20.13; Wed, 21 Apr 2021 08:20:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Cx7foaBS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240647AbhDUNFY (ORCPT + 99 others); Wed, 21 Apr 2021 09:05:24 -0400 Received: from mail.kernel.org ([198.145.29.99]:43838 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239499AbhDUNE2 (ORCPT ); Wed, 21 Apr 2021 09:04:28 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 75B7D6143B; Wed, 21 Apr 2021 13:03:54 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010235; bh=ddu+4co7Kt9tLyVFX3hnwu31l+5r/KYvdlwr2dFv+rA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Cx7foaBSEhT9rwU9xnePVfbjeEqzXGhD+q3Sfny/gNH75tNN4Jk11TBr3SqOMPK3v vVZekQSydZRoW6h5Bk00yO6LlbEenIe1m1xyu7MgH/8CnjQshKoBNZLbtr/b0BgDPz lhX7gsJAQwXhomd0989eBVVrvWOGJFFcznscjwts= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Aditya Pakki Subject: [PATCH 060/190] Revert "staging: kpc2000: remove unnecessary assertions in kpc_dma_transfer" Date: Wed, 21 Apr 2021 14:58:55 +0200 Message-Id: <20210421130105.1226686-61-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit d7a336d67ab5443a0ef14b8335d139e855e8a682. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Aditya Pakki Cc: https Cc: Greg Kroah-Hartman Signed-off-by: Greg Kroah-Hartman --- drivers/staging/kpc2000/kpc_dma/fileops.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/drivers/staging/kpc2000/kpc_dma/fileops.c b/drivers/staging/kpc2000/kpc_dma/fileops.c index 10dcd6646b01..7fdad86044ca 100644 --- a/drivers/staging/kpc2000/kpc_dma/fileops.c +++ b/drivers/staging/kpc2000/kpc_dma/fileops.c @@ -49,7 +49,9 @@ static int kpc_dma_transfer(struct dev_private_data *priv, u64 dma_addr; u64 user_ctl; + BUG_ON(priv == NULL); ldev = priv->ldev; + BUG_ON(ldev == NULL); acd = kzalloc(sizeof(*acd), GFP_KERNEL); if (!acd) { -- 2.31.1