Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp518241pxy; Wed, 21 Apr 2021 08:21:04 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzKC19Ni+GOuukLMCcnrAUpexGfI29UGkmAeiOAIL+Qi3SvUXe0wCXdbXM5Q6voeuxp7srB X-Received: by 2002:a62:7c05:0:b029:25a:3f7c:2fe2 with SMTP id x5-20020a627c050000b029025a3f7c2fe2mr24538241pfc.59.1619018464610; Wed, 21 Apr 2021 08:21:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619018464; cv=none; d=google.com; s=arc-20160816; b=Sru9nukXkIDJd4z5Tb8257GArzA0HfFcUnXguHTq6ROjPbqFdjdgi4m0/9mxWmn0PO VmHUHTh4yzxywaIZSkEmSsu1/xfcQQAtlCtvxSKr47NXOnIum6Ch2Oi3g7UvdsilJyy7 GnsMYxkka8Z0sI2vtWy1lSIxjXoVcJzTWUX6zbt5j+qvrlyEiJY+VvKtAUIrnDpE7M2r Ca7Cff6DNtV/vVtClVpjf0de3kS8gdEe1U6hpDvL+Vc3Sun0+GAecc4Bpn6dJN/TQitM EUupNOZdnrSnWINIPHTR3eD/yo3dr1wpfILfrvGQWAD78jFBPqHHTCAGrSLB9l8zMIJQ 0Kaw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=FbWV44zEFFqRJm3xen+DlzRF3LTFlnbi4dlOvDd3jqI=; b=W1HNxOB+YJM/WsSdeN9LuRHBpQwFFVbGJVLn0KUKUGsvsxXvVki/8+hKd/kDZ1vNFb gRnSEwvAskIMXxyB9O4R/nULpCWn6QtJsABQ2jX0Q/Cqoj4/XciVbtNJ5IGjesHVeCKQ uFsxiuksNDFV7hXAFWmWNHcaUkvX50tqsy9fVPKag76kqEXFJqTXE7r06KXo4QaI/F5K 9sg0JkMH5jExzkxJ9i3UT9zFhTHLoD6eC2aPjWp9dUNOM6gvJMlnwJF2pvaVCF8u6IGr NHu3SSfBM2pWtIdR85FraFQX8LaHFFbSiGKRGWSlIyQQopQIelsECHWFqzgUJt3c7NLs Syqw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=j9DFjm6f; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y63si2809244pgb.481.2021.04.21.08.20.51; Wed, 21 Apr 2021 08:21:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=j9DFjm6f; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240815AbhDUNFk (ORCPT + 99 others); Wed, 21 Apr 2021 09:05:40 -0400 Received: from mail.kernel.org ([198.145.29.99]:43838 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240721AbhDUNEj (ORCPT ); Wed, 21 Apr 2021 09:04:39 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 9C6846143B; Wed, 21 Apr 2021 13:04:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010246; bh=H2pJce2KP7UAPHvN+4v+sJafKZ5LNmgaqnLtIeULL5Y=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=j9DFjm6f6PQpTnHGi63oNu0Rw3I25Np6Jvzdk4tALBGGyY5R1ZeW045sdgtgnRQeU 8YHT8hJqV4Eh4bBmZxZgvlcR9kwgVpQa+Qv3UMHJ64aONR9jPnhS42IQkQ50xKRMuU m7ClAcYBGcXQl4H2zs9fHC9suwfMmOzos42DA5FQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Aditya Pakki , "David S . Miller" Subject: [PATCH 064/190] Revert "nfc: s3fwrn5: replace the assertion with a WARN_ON" Date: Wed, 21 Apr 2021 14:58:59 +0200 Message-Id: <20210421130105.1226686-65-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit 615f22f58029aa747b12768985e7f91cd053daa2. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Aditya Pakki Cc: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/nfc/s3fwrn5/firmware.c | 5 +---- 1 file changed, 1 insertion(+), 4 deletions(-) diff --git a/drivers/nfc/s3fwrn5/firmware.c b/drivers/nfc/s3fwrn5/firmware.c index eb5d7a5beac7..f77f183c9bd0 100644 --- a/drivers/nfc/s3fwrn5/firmware.c +++ b/drivers/nfc/s3fwrn5/firmware.c @@ -492,10 +492,7 @@ int s3fwrn5_fw_recv_frame(struct nci_dev *ndev, struct sk_buff *skb) struct s3fwrn5_info *info = nci_get_drvdata(ndev); struct s3fwrn5_fw_info *fw_info = &info->fw_info; - if (WARN_ON(fw_info->rsp)) { - kfree_skb(skb); - return -EINVAL; - } + BUG_ON(fw_info->rsp); fw_info->rsp = skb; -- 2.31.1