Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp541840pxy; Wed, 21 Apr 2021 08:54:18 -0700 (PDT) X-Google-Smtp-Source: ABdhPJznnc3+3jQ1IC8Nwdj6ikQ25MLlloeDNUawuPThQaSAmDgV8mocKut/pQY/sMyI3PsBXR/j X-Received: by 2002:aa7:80d6:0:b029:258:9404:13e with SMTP id a22-20020aa780d60000b02902589404013emr28114739pfn.37.1619020458498; Wed, 21 Apr 2021 08:54:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619020458; cv=none; d=google.com; s=arc-20160816; b=nl2/ya0Iq3gO1PSLj7KhJS7egKiiFTlhqELbAQMnB1pW8gj/6t1G4SlQ0FA2XQlLgz 5qKXIsy7dvNuRIliUzJJW361fC4uradq5WA5+mdLoWQdmToLtXaIHtvUpScJiA+jN/UU duG3+sRV5NCplAJoWLphLhRJPgU4k0QNc6TFqaW+6qwr+GOimO4DUCZHIMGE+qrUvl+k ncagt35y9V+7D9q23pcJjDo1SlArwi0MC5VB4bLcByQcGsAJCKrmiwuy/wXyD0Ggdwwp sjtOM0KFdcs21Gd3QRkij/V5BJWKBr52OtrW1w/AbLMObC6VNprdwIMc5YlcHdwpJuw8 h90w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=aY6fakAw3r5X3LdLnMghCEMWBlHhUSM8RpNV81uhFTo=; b=DpeMsJSv4vLEATEVIZVKpmUgARb4JrnTi9NMtP+23RbP/3ScbF5qKzvydUoq0+olSu OJHxqe3HRpYZSxIVfFYShz63FIkZSOBGkmABKPoDrPJqKYBc1Ili5BtevkUBRPVfifBW fFE6Q0Rmu5SmKQu7U8EZKk0mPUMuTlX2zaOUecMSWC3AMAWj32ioXax65L3bVtiRTi2c qOpubhAMTebsbovtDVEHQc4rzrbD5iWcUXAxjIyUy8rnp4elOzzR5Es85m3hK7AcF9/m yibhMF4wEGxVpD73qE3Bossh4sI1RPfHzXmL6q/SjrLmnsv7Xj264CFvrTDlTr5wIkcZ v5MQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=VSkemney; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w10si456488pgs.110.2021.04.21.08.54.06; Wed, 21 Apr 2021 08:54:18 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=VSkemney; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241328AbhDUNIH (ORCPT + 99 others); Wed, 21 Apr 2021 09:08:07 -0400 Received: from mail.kernel.org ([198.145.29.99]:46346 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235371AbhDUNF7 (ORCPT ); Wed, 21 Apr 2021 09:05:59 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 1561261459; Wed, 21 Apr 2021 13:05:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010326; bh=iXg+8KxDKOBhkRze7GpiKTXV0xC00Ox02bUbCZX+qWU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=VSkemneyvBg8XNJT5XoOZnUyT+hSIYlQ8zXFEVmWBNpqx32vECRBGTOgD9Cf6OnQl 2LSdUWoWnqsX4NXVpQuQ0uQO2CZEtOV8nS4AcW6WlijamvmIyHYKSD6zoSyZIxGSL5 kSdyfEeoOLn7NQ0Oh8ucnn2XQ7HZBQEHW9379IHI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Kangjie Lu , Kalle Valo Subject: [PATCH 095/190] Revert "rtlwifi: fix a potential NULL pointer dereference" Date: Wed, 21 Apr 2021 14:59:30 +0200 Message-Id: <20210421130105.1226686-96-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit 765976285a8c8db3f0eb7f033829a899d0c2786e. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Kangjie Lu Cc: Kalle Valo Signed-off-by: Greg Kroah-Hartman --- drivers/net/wireless/realtek/rtlwifi/base.c | 5 ----- 1 file changed, 5 deletions(-) diff --git a/drivers/net/wireless/realtek/rtlwifi/base.c b/drivers/net/wireless/realtek/rtlwifi/base.c index 6e8bd99e8911..1d067536889e 100644 --- a/drivers/net/wireless/realtek/rtlwifi/base.c +++ b/drivers/net/wireless/realtek/rtlwifi/base.c @@ -452,11 +452,6 @@ static void _rtl_init_deferred_work(struct ieee80211_hw *hw) /* <2> work queue */ rtlpriv->works.hw = hw; rtlpriv->works.rtl_wq = alloc_workqueue("%s", 0, 0, rtlpriv->cfg->name); - if (unlikely(!rtlpriv->works.rtl_wq)) { - pr_err("Failed to allocate work queue\n"); - return; - } - INIT_DELAYED_WORK(&rtlpriv->works.watchdog_wq, rtl_watchdog_wq_callback); INIT_DELAYED_WORK(&rtlpriv->works.ips_nic_off_wq, -- 2.31.1