Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp538537pxy; Wed, 21 Apr 2021 08:49:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxp/FEFVx9+M7IRdv4GVbFQK9IKDn+E65x5ggDq6ryQdDSQ/3ws1h3Tw4BReu7OtltKkhQ/ X-Received: by 2002:a17:906:f18e:: with SMTP id gs14mr33323024ejb.441.1619020150134; Wed, 21 Apr 2021 08:49:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619020150; cv=none; d=google.com; s=arc-20160816; b=PYhftPJm3SRExePudt5o1ym4lb8AX6v5YoEg67I58t9uyt7OqP17pEoq22pfzpkdia LwMCvufrbnbh6665e7s8NTLhBT1yQfmAPCNkw3RD1260bY0uEKXDy8VcpmmBrV3YGcG4 yWzW6T31tvbtDK9WCNvZVkf9dmw9g4NwuEZ/tBlc3/yIj8jDVvjFcyzJzcHoZxCxlPmR ad/AO5k8O5ntmMb9rCeJfQMsJGcPYxvxHLJLUz5fkezQQMDmzbJQeqJscMHl38Wd/7Px 2uLiuy+xDdpp3yoGiw8i/Q1LG/pCaEwMrd/ZYs0Ns08lZizfdH4Zg5h+Vys5xBDoUSnG EReg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=SUniB4nflrSSVqfK7Cv7urqYHHY57ePfOn2ZzzX8YfA=; b=Lc0+OjEUvB5g2TRA3pc+2azX3sAbtSIbE/d6CLGFlbP/fG9ZcDbTfMgTdDHAdLF1DT j6rUBuSuHecqy/wkuNJzp8QgXWDx0UpZCXg6SCaUBiLg/PonZdBecl7tQXiz1vvsDf7m Eh1Xpnl/V1Fh2ZLOBZytKVs3ZdpB21zNUvX8wsC7I0ehVOxNk/GxZBxlpyi5I+JqVHZf CyHeKEWupDxoSTpmzM9OuxY7Tnqk0uFFQgFpF+u0I7wHIaia26/GOGhCPH9lbii0cveM 18QV1KHTpRYKvs+RikDGN0VcS2eaJqKIudwHvq+boqDGB4XhR65q1NDiZJNtnji2A2zE 7tLA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=c1oME+lg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r8si2318270edw.146.2021.04.21.08.48.46; Wed, 21 Apr 2021 08:49:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=c1oME+lg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240721AbhDUNHc (ORCPT + 99 others); Wed, 21 Apr 2021 09:07:32 -0400 Received: from mail.kernel.org ([198.145.29.99]:43838 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240826AbhDUNFq (ORCPT ); Wed, 21 Apr 2021 09:05:46 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id A545161494; Wed, 21 Apr 2021 13:05:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010313; bh=gQQLJDAzzJBQbG/E7ybbAyUR3aHwH5+xI5XATwqOUmE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=c1oME+lggFrS5ahiQ4Bnb+V6JDRqlevT5CMrK5E3kblHVWbyhQ5IkfNjo76ke6aVL sYrnCPChNUgu5mYGubAQPCCJ/+G7mYhyXGheWZ060JD1lWqQm75Gi8WgL0iI3QMADD Za6KaZsI8o4tE09vxtKsnRT1YpWpUoI6x9s6eXl4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Kangjie Lu , Ursula Braun , "David S . Miller" Subject: [PATCH 090/190] Revert "net/smc: fix a NULL pointer dereference" Date: Wed, 21 Apr 2021 14:59:25 +0200 Message-Id: <20210421130105.1226686-91-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit e183d4e414b64711baf7a04e214b61969ca08dfa. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Kangjie Lu Cc: Ursula Braun Cc: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/smc/smc_ism.c | 5 ----- 1 file changed, 5 deletions(-) diff --git a/net/smc/smc_ism.c b/net/smc/smc_ism.c index 9c6e95882553..6558cf7643a7 100644 --- a/net/smc/smc_ism.c +++ b/net/smc/smc_ism.c @@ -417,11 +417,6 @@ struct smcd_dev *smcd_alloc_dev(struct device *parent, const char *name, init_waitqueue_head(&smcd->lgrs_deleted); smcd->event_wq = alloc_ordered_workqueue("ism_evt_wq-%s)", WQ_MEM_RECLAIM, name); - if (!smcd->event_wq) { - kfree(smcd->conn); - kfree(smcd); - return NULL; - } return smcd; } EXPORT_SYMBOL_GPL(smcd_alloc_dev); -- 2.31.1