Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp543717pxy; Wed, 21 Apr 2021 08:56:53 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw3jQKZl/Jpci2+uckBjxVzK0BqIT7xZA68udKlRhkERkA+zr1BvI06khuzDAk4Q26Vx2GG X-Received: by 2002:a62:1a12:0:b029:248:9023:6aca with SMTP id a18-20020a621a120000b029024890236acamr30943288pfa.5.1619020612877; Wed, 21 Apr 2021 08:56:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619020612; cv=none; d=google.com; s=arc-20160816; b=mRg++V1/9QP7z07kivoG76wIIv011bGLJvm+kCfsyXqMir64ZQaN0BhYcnZndFQ1uz 1ZHn5Ok938TPgUrYXIeuv3HD4mZlAwars9R/iBRbZIwzaddOfxKnOfOPTY4ZU9/SGwln A1NyL4O9XPy7q76p08fQKHtcssHHvGYLJpH24lj9DiSMtcMfc+bwgc/TDz9oIENPcgEP L1HIiNJKoLAbI+sN1IRQieQyN8ixkqiDgMMncZUmMbte60Qgvv7bQMjR37T/IB2voUzS rArxIvzvXQN/Od49tEoOOgEp/spt13ya250ka3MVvMkNMxPFmsmzJVbVVHMFM4KZYL7+ HW7Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=Fv65ngbIIrhGQPZddLmaZ4sWEGVfAL3FCLHTnUjrDtk=; b=JGwO+7lfD8nmTVDH9xwMH/sHOKHRPCEsCWoKBhMbTjOH3YMaJjLLO6kCJubKKcYFqm kuvLreP00eYOyJfGUaTZixzbWm7qu0PmKkzgxqNR5PeJrHFAbk0pUyXL+AmkEhp2t71R QayJ/xVPzqySgeRZrOBsDz63O2vdxHvjkh+gqDIT84lwVTJH1fpwtvDB0jmAtxqqgzK5 KLscgcGi/7S6UFuYN7+02OIRMhHfuaz8hloPZBXHf0sS0UaacGPSEr3AL+hwtSm8CqE9 m6TyU+/stO0APN7QcnYH4tmubxaKXbrZtqnSv8k02qt0QPJgEDuLvI6JSKQnBbBhYINc 48nA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=L7N6nrAp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c17si2681591pfb.330.2021.04.21.08.56.41; Wed, 21 Apr 2021 08:56:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=L7N6nrAp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241666AbhDUNJP (ORCPT + 99 others); Wed, 21 Apr 2021 09:09:15 -0400 Received: from mail.kernel.org ([198.145.29.99]:46884 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241033AbhDUNGq (ORCPT ); Wed, 21 Apr 2021 09:06:46 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 49E4261477; Wed, 21 Apr 2021 13:06:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010369; bh=23ldNKy3hV6pudqhZXpZA4qAPN/pyit8dk3C+COTKh8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=L7N6nrApSR4NHikwq1AAJ8RXJPbiV29NSRW99yFX35Cmc1CG7txTyE1E4RJHmJQ+v uLBSSaLyHM9sP6pLLhpS5/0TXnhxHh9IbBse57U4JsYxNOb+IdpHCPdbhNx56EN8ep N0LL93aZjPETsOx2V9/fyb4+0udwHIS4uGtUMw8A= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Kangjie Lu , Andrew Bowers , Mukesh Ojha , Jeff Kirsher Subject: [PATCH 076/190] Revert "net: ixgbevf: fix a missing check of ixgbevf_write_msg_read_ack" Date: Wed, 21 Apr 2021 14:59:11 +0200 Message-Id: <20210421130105.1226686-77-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit 20d437ee8f4899573e6ea76c06ef0206e98bccb6. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Kangjie Lu Cc: Andrew Bowers Cc: Mukesh Ojha Cc: Jeff Kirsher Signed-off-by: Greg Kroah-Hartman --- drivers/net/ethernet/intel/ixgbevf/vf.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/drivers/net/ethernet/intel/ixgbevf/vf.c b/drivers/net/ethernet/intel/ixgbevf/vf.c index bfe6dfcec4ab..501823f2d1c0 100644 --- a/drivers/net/ethernet/intel/ixgbevf/vf.c +++ b/drivers/net/ethernet/intel/ixgbevf/vf.c @@ -508,8 +508,9 @@ static s32 ixgbevf_update_mc_addr_list_vf(struct ixgbe_hw *hw, vector_list[i++] = ixgbevf_mta_vector(hw, ha->addr); } - return ixgbevf_write_msg_read_ack(hw, msgbuf, msgbuf, - IXGBE_VFMAILBOX_SIZE); + ixgbevf_write_msg_read_ack(hw, msgbuf, msgbuf, IXGBE_VFMAILBOX_SIZE); + + return 0; } /** -- 2.31.1