Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp547239pxy; Wed, 21 Apr 2021 09:01:32 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwCTUZyGAObS90RRqkO1mN+XLInCZOiYeuEqlo5OKCDPYCc/hOXm51m1x/XFKIEXlmiQt6O X-Received: by 2002:a65:4b8c:: with SMTP id t12mr22989242pgq.257.1619020892234; Wed, 21 Apr 2021 09:01:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619020892; cv=none; d=google.com; s=arc-20160816; b=ZOAEldgirVISP9P5fHwO9AgZZRH8INcNWHRNsy29OemRLRUoB7aKC+GUS8x4rfjgC3 I84VNxvDUC8I7dpOgxqPSB/mTacuROrdcCbp7yZ/MLwBuz6nuV4l0sv4uMlesGmEU2GZ lTMUuRvULAehkPko3HjVRR4KY7dIgSQ+GJA0oj6Mcpl7UMraRddc17VFXWmbS+exIGs1 tRWjDYYqhQvxfNLA4RkfOTNxNZl0haqQUrHMPOYzM2A6Q98omoU+ZbhBgOinbj/uqbNJ ZZRJhjB7FQlQvMUlj+PSTu/QS7XW83zcBK8DgM787HtoYEb06zaKsJxvq9e2akFyoUxE 6mxA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=6XZpnxru0FVlQPigVQ55hLcP8uHTWOVp0QPowBXcqy0=; b=SivdbMciRHX9cm1GMNyBSW1/HC2tlKCcdFPRNlWT46jnn8h4ZZztwBir5V2XhB81OB jx5IDfvbne64l5gdXbUv2mCq7/YHKCGjPHgVi9pJ4vFc050HTpvicIndtX1F6aGwvFXs tLBEIUmfr1oADAOeiTNVwQDQmTDZxlfpIv+vw6SH/AfKg7/iHzzgitpEsWO5DaCKWrbR /Jke2UbiCEg2SbyYkCYlEKAqwdPa0vrtC8tTJYhwUyxh2ZW8npyWFkFqa6h3VveJoroO 37dIRNQreXbyebhquEnl2ZHWWAjIRDt8jYRR390N/qTncYBRao4JwTdaNnZT/A2bLtIk 52DQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=CxZuPXI3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x19si2987685pgf.296.2021.04.21.09.01.17; Wed, 21 Apr 2021 09:01:32 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=CxZuPXI3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241392AbhDUNIW (ORCPT + 99 others); Wed, 21 Apr 2021 09:08:22 -0400 Received: from mail.kernel.org ([198.145.29.99]:47630 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240943AbhDUNGS (ORCPT ); Wed, 21 Apr 2021 09:06:18 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id E53B761458; Wed, 21 Apr 2021 13:05:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1619010345; bh=2ycM2uqfzYjMsQHL5ct7JTX4bBiNqWZl4SpNrvgt/xY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=CxZuPXI3UsCbXn614XGcMFA65pBwOHtRis8EVc/mryA9nR2jZQ4UKofNGC4mEf65y BmLnhC1wbuHGnuIRQsCMHeGpZuRdAKmi8o2wc5qHIaompYiLllo8DnAhStRrQo7qJm vsqnHkD0mB6tHavi9z52+H9P0bN+2vl3VD6ygHtA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , Kangjie Lu , Lorenzo Pieralisi , Steven Price , Mukesh Ojha Subject: [PATCH 101/190] Revert "PCI: xilinx: Check for __get_free_pages() failure" Date: Wed, 21 Apr 2021 14:59:36 +0200 Message-Id: <20210421130105.1226686-102-gregkh@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210421130105.1226686-1-gregkh@linuxfoundation.org> References: <20210421130105.1226686-1-gregkh@linuxfoundation.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit 699ca30162686bf305cdf94861be02eb0cf9bda2. Commits from @umn.edu addresses have been found to be submitted in "bad faith" to try to test the kernel community's ability to review "known malicious" changes. The result of these submissions can be found in a paper published at the 42nd IEEE Symposium on Security and Privacy entitled, "Open Source Insecurity: Stealthily Introducing Vulnerabilities via Hypocrite Commits" written by Qiushi Wu (University of Minnesota) and Kangjie Lu (University of Minnesota). Because of this, all submissions from this group must be reverted from the kernel tree and will need to be re-reviewed again to determine if they actually are a valid fix. Until that work is complete, remove this change to ensure that no problems are being introduced into the codebase. Cc: Kangjie Lu Cc: Lorenzo Pieralisi Cc: Steven Price Cc: Mukesh Ojha Signed-off-by: Greg Kroah-Hartman --- drivers/pci/controller/pcie-xilinx.c | 12 ++---------- 1 file changed, 2 insertions(+), 10 deletions(-) diff --git a/drivers/pci/controller/pcie-xilinx.c b/drivers/pci/controller/pcie-xilinx.c index fa5baeb82653..942c25bf7980 100644 --- a/drivers/pci/controller/pcie-xilinx.c +++ b/drivers/pci/controller/pcie-xilinx.c @@ -326,19 +326,14 @@ static const struct irq_domain_ops msi_domain_ops = { * xilinx_pcie_enable_msi - Enable MSI support * @port: PCIe port information */ -static int xilinx_pcie_enable_msi(struct xilinx_pcie_port *port) +static void xilinx_pcie_enable_msi(struct xilinx_pcie_port *port) { phys_addr_t msg_addr; port->msi_pages = __get_free_pages(GFP_KERNEL, 0); - if (!port->msi_pages) - return -ENOMEM; - msg_addr = virt_to_phys((void *)port->msi_pages); pcie_write(port, 0x0, XILINX_PCIE_REG_MSIBASE1); pcie_write(port, msg_addr, XILINX_PCIE_REG_MSIBASE2); - - return 0; } /* INTx Functions */ @@ -493,7 +488,6 @@ static int xilinx_pcie_init_irq_domain(struct xilinx_pcie_port *port) struct device *dev = port->dev; struct device_node *node = dev->of_node; struct device_node *pcie_intc_node; - int ret; /* Setup INTx */ pcie_intc_node = of_get_next_child(node, NULL); @@ -522,9 +516,7 @@ static int xilinx_pcie_init_irq_domain(struct xilinx_pcie_port *port) return -ENODEV; } - ret = xilinx_pcie_enable_msi(port); - if (ret) - return ret; + xilinx_pcie_enable_msi(port); } return 0; -- 2.31.1